]>
| Commit | Line | Data |
|---|---|---|
| 1 | Bugfixes: | |
| 2 | ||
| 3 | * Many manager configuration settings that are only applicable to user | |
| 4 | manager or system manager can be always set. It would be better to reject | |
| 5 | them when parsing config. | |
| 6 | ||
| 7 | * Jun 01 09:43:02 krowka systemd[1]: Unit user@1000.service has alias user@.service. | |
| 8 | Jun 01 09:43:02 krowka systemd[1]: Unit user@6.service has alias user@.service. | |
| 9 | Jun 01 09:43:02 krowka systemd[1]: Unit user-runtime-dir@6.service has alias user-runtime-dir@.service. | |
| 10 | ||
| 11 | External: | |
| 12 | ||
| 13 | * Fedora: add an rpmlint check that verifies that all unit files in the RPM are listed in %systemd_post macros. | |
| 14 | ||
| 15 | * dbus: | |
| 16 | - natively watch for dbus-*.service symlinks (PENDING) | |
| 17 | - teach dbus to activate all services it finds in /etc/systemd/services/org-*.service | |
| 18 | ||
| 19 | * fedora: suggest auto-restart on failure, but not on success and not on coredump. also, ask people to think about changing the start limit logic. Also point people to RestartPreventExitStatus=, SuccessExitStatus= | |
| 20 | ||
| 21 | * neither pkexec nor sudo initialize environ[] from the PAM environment? | |
| 22 | ||
| 23 | * fedora: update policy to declare access mode and ownership of unit files to root:root 0644, and add an rpmlint check for it | |
| 24 | ||
| 25 | * missing shell completions: | |
| 26 | - systemd-hwdb | |
| 27 | ||
| 28 | * zsh shell completions: | |
| 29 | - <command> <verb> -<TAB> should complete options, but currently does not | |
| 30 | - systemctl add-wants,add-requires | |
| 31 | - systemctl reboot --boot-loader-entry= | |
| 32 | ||
| 33 | * systemctl status should know about 'systemd-analyze calendar ... --iterations=' | |
| 34 | * If timer has just OnInactiveSec=..., it should fire after a specified time | |
| 35 | after being started. | |
| 36 | ||
| 37 | * write blog stories about: | |
| 38 | - hwdb: what belongs into it, lsusb | |
| 39 | - enabling dbus services | |
| 40 | - how to make changes to sysctl and sysfs attributes | |
| 41 | - remote access | |
| 42 | - how to pass throw-away units to systemd, or dynamically change properties of existing units | |
| 43 | - auto-restart | |
| 44 | - how to develop against journal browsing APIs | |
| 45 | - the journal HTTP iface | |
| 46 | - non-cgroup resource management | |
| 47 | - dynamic resource management with cgroups | |
| 48 | - refreshed, longer missions statement | |
| 49 | - calendar time events | |
| 50 | - init=/bin/sh vs. "emergency" mode, vs. "rescue" mode, vs. "multi-user" mode, vs. "graphical" mode, and the debug shell | |
| 51 | - how to create your own target | |
| 52 | - instantiated apache, dovecot and so on | |
| 53 | - hooking a script into various stages of shutdown/early boot | |
| 54 | ||
| 55 | Regularly: | |
| 56 | ||
| 57 | * look for close() vs. close_nointr() vs. close_nointr_nofail() | |
| 58 | ||
| 59 | * check for strerror(r) instead of strerror(-r) | |
| 60 | ||
| 61 | * pahole | |
| 62 | ||
| 63 | * set_put(), hashmap_put() return values check. i.e. == 0 does not free()! | |
| 64 | ||
| 65 | * link up selected blog stories from man pages and unit files Documentation= fields | |
| 66 | ||
| 67 | Janitorial Clean-ups: | |
| 68 | ||
| 69 | * machined: make remaining machine bus calls compatible with unpriv machined + | |
| 70 | unpriv npsawn: GetAddresses(), GetSSHInfo(), GetOSRelease(), OpenPTY(), | |
| 71 | OpenLogin(), OpenShell(), BindMount(), CopyFrom(), CopyTo(), | |
| 72 | OpenRootDirectory(). Similar for images: GetHostname(), GetMachineID(), | |
| 73 | GetMachineInfo(), GetOSRelease(). | |
| 74 | ||
| 75 | * rework mount.c and swap.c to follow proper state enumeration/deserialization | |
| 76 | semantics, like we do for device.c now | |
| 77 | ||
| 78 | * Replace our fstype_is_network() with a call to libmount's mnt_fstype_is_netfs()? | |
| 79 | Having two lists is not nice, but maybe it's now worth making a dependency on | |
| 80 | libmount for something so trivial. | |
| 81 | ||
| 82 | * drop set_free_free() and switch things over from string_hash_ops to | |
| 83 | string_hash_ops_free everywhere, so that destruction is implicit rather than | |
| 84 | explicit. Similar, for other special hashmap/set/ordered_hashmap destructors. | |
| 85 | ||
| 86 | * generators sometimes apply C escaping and sometimes specifier escaping to | |
| 87 | paths and similar strings they write out. Sometimes both. We should clean | |
| 88 | this up, and should probably always apply both, i.e. introduce | |
| 89 | unit_file_escape() or so, which applies both. | |
| 90 | ||
| 91 | * xopenat() should pin the parent dir of the inode it creates before doing its | |
| 92 | thing, so that it can create, open, label somewhat atomically. | |
| 93 | ||
| 94 | * use CHASE_MUST_BE_DIRECTORY and CHASE_MUST_BE_REGULAR at more places (the | |
| 95 | majority of places that currently employ chase() probably should use this) | |
| 96 | ||
| 97 | Deprecations and removals: | |
| 98 | ||
| 99 | * Remove any support for booting without /usr pre-mounted in the initrd entirely. | |
| 100 | Update INITRD_INTERFACE.md accordingly. | |
| 101 | ||
| 102 | * remove cgroups v1 support EOY 2023. As per | |
| 103 | https://lists.freedesktop.org/archives/systemd-devel/2022-July/048120.html | |
| 104 | and then rework cgroupsv2 support around fds, i.e. keep one fd per active | |
| 105 | unit around, and always operate on that, instead of cgroup fs paths. | |
| 106 | ||
| 107 | * drop support for getrandom()-less kernels. (GRND_INSECURE means once kernel | |
| 108 | 5.6 becomes our baseline). See | |
| 109 | https://github.com/systemd/systemd/pull/24101#issuecomment-1193966468 for | |
| 110 | details. Maybe before that: at taint-flags/warn about kernels that lack | |
| 111 | getrandom()/environments where it is blocked. | |
| 112 | ||
| 113 | * drop support for LOOP_CONFIGURE-less loopback block devices, once kernel | |
| 114 | baseline is 5.8. | |
| 115 | ||
| 116 | * drop fd_is_mount_point() fallback mess once we can rely on | |
| 117 | STATX_ATTR_MOUNT_ROOT to exist i.e. kernel baseline 5.8 | |
| 118 | ||
| 119 | * Once baseline is 5.10, remove support or MS_NOSYMFOLLOW-less kernels | |
| 120 | ||
| 121 | * Remove /dev/mem ACPI FPDT parsing when /sys/firmware/acpi/fpdt is ubiquitous. | |
| 122 | That requires distros to enable CONFIG_ACPI_FPDT, and have kernels v5.12 for | |
| 123 | x86 and v6.2 for arm. | |
| 124 | ||
| 125 | * In v260: remove support for deprecated FactoryReset EFI variable in | |
| 126 | systemd-repart, replaced by FactoryResetRequest. | |
| 127 | ||
| 128 | * Consider removing root=gpt-auto, and push people to use root=dissect instead. | |
| 129 | ||
| 130 | * Once | |
| 131 | https://github.com/util-linux/util-linux/commit/508fb0e7ac103b68531a59db2a4473897853ab52 | |
| 132 | has hit the prominent distributions, revert --issue-file= hack in units/*getty*service.in | |
| 133 | ||
| 134 | * Once kernel baseline is 5.7, obsolete DefaultMemoryMin/Low= and DefaultStartupMemoryLow= | |
| 135 | since we can systematically enable memory_recursiveprot on cgroupfs and have those | |
| 136 | enforced by the kernel | |
| 137 | ||
| 138 | Features: | |
| 139 | ||
| 140 | * networkd/machined: implement reverse name lookups in the resolved hook | |
| 141 | ||
| 142 | * networkd's resolved hook: optionally map all lease IP addresses handed out to | |
| 143 | the same hostname which is configured on the .network file. Optionally, even | |
| 144 | derive this single name from the network interface name (i.e. probably | |
| 145 | altname or so). This way, when spawning a VM the host could pick the hostname | |
| 146 | for it and the client gets no say. | |
| 147 | ||
| 148 | * systemd-repart: add --ghost, that creates file systems, updates the kernel's | |
| 149 | partition table but does *not* update partition table on disk. This way, we | |
| 150 | have disk backed file systems that go effectively disappear on reboot. This | |
| 151 | is useful when booting from a "live" usb stick that is writable, as it means | |
| 152 | we do not have to place everything in memory. Moreover, we could then migrate | |
| 153 | the file systems to disk later (using btrfs device replacement), if needed as | |
| 154 | part of an installer logic. | |
| 155 | ||
| 156 | * add a concept of overlay directory stacks to image discovery, i.e. have a dir | |
| 157 | with a name suffix of ".ovl" or so that contains DDIs and plain dirs (and | |
| 158 | possible .v dirs) that are glued together on use via overlayfs. one special | |
| 159 | subdir should be used as writable top layer. | |
| 160 | ||
| 161 | * journald: log pidfid as another field, i.e. _PIDFDID= | |
| 162 | ||
| 163 | * systemd-nspawn: something like --volatile= but that isn't volatile, but | |
| 164 | stores the data in some separate dir on disk. Usecase: keep always up-to-date | |
| 165 | DDIs of some OS in your home dir, but combine its /usr/ with a locally | |
| 166 | maintained root fs in a regular dir to maintain local state. (idea: call it | |
| 167 | --mutable= and take dir or DDI and merge in) | |
| 168 | ||
| 169 | * measure all log-in attempts into a new nvpcr | |
| 170 | ||
| 171 | * measure all DDI activations into a new nvpcr | |
| 172 | ||
| 173 | * maybe rework systemd-modules-load to be a generator that just instantiates | |
| 174 | modprobe@.service a bunch of times | |
| 175 | ||
| 176 | * Split vconsole-setup in two, of which the second is started via udev (instead | |
| 177 | of the "restart" job it currently fires). That way, boot becomes purely | |
| 178 | positive again, and we can nicely order the two against each other. | |
| 179 | ||
| 180 | * Add ELF section to make systemd main binary recognizable cleanly, the same | |
| 181 | way as we make sd-boot recognizable via PE section. | |
| 182 | ||
| 183 | * Add knob to cryptsetup, to trigger automatic reboot on failure to unlock | |
| 184 | disk. Enable this by default for rootfs, also in gpt-auto-generator | |
| 185 | ||
| 186 | * Add RebootUptimeMinSec= knob to PID 1, that makes systemd-shutdown sleep | |
| 187 | until the specified uptime has passed, to lengthen tight boot loops. | |
| 188 | ||
| 189 | * replace bootctl's PE version check to actually use APIs from pe-binary.[ch] | |
| 190 | to find binary version. | |
| 191 | ||
| 192 | * replace symlink_label(), mknodat_label(), btrfs_subvol_make_label(), | |
| 193 | mkdir_label() and related calls by flags-based calls that use | |
| 194 | label_ops_pre()/label_ops_post(). | |
| 195 | ||
| 196 | * maybe reconsider whether virtualization consoles (hvc1) are considered local | |
| 197 | or remote. i.e. are they more like an ssh login, or more like a /dev/tty1 | |
| 198 | login? Lennart used to believe the former, but maybe the latter is more | |
| 199 | appropriate? This has effect on polkit interactivity, since it would mean | |
| 200 | questions via hvc0 would suddenly use the local polkit property. But this | |
| 201 | also raises the question whether such sessions shall be considered active or | |
| 202 | not | |
| 203 | ||
| 204 | * automatically reset specific EFI vars on factory reset (make this generic | |
| 205 | enough so that infrac can be used to erase shim's mok vars?) | |
| 206 | ||
| 207 | * similar: add a plugin for factory reset logic that erases certain parts of | |
| 208 | the ESP, but leaves others in place. | |
| 209 | ||
| 210 | * systemd-repart: add --defer-partitions-factory-reset or so, as a flavour of | |
| 211 | --defer-partitions= that picks all partitions that are marked for factory | |
| 212 | reset. for an installer this is usually the partitions not to copy, too. | |
| 213 | ||
| 214 | * flush_fd() should probably try to be smart and stop reading once we know that | |
| 215 | all further queued data was enqueued after flush_fd() was originally | |
| 216 | called. For that, try SIOCINQ if fd refers to stream socket, and look at | |
| 217 | timestamps for datagram sockets. | |
| 218 | ||
| 219 | * Similar flush_accept() should look at sockdiag queued sockets count and exit | |
| 220 | once we flushed out the specified number of connections. | |
| 221 | ||
| 222 | * maybe introduce a new per-unit drop-in directory .confext.d/ that may contain | |
| 223 | symlinks to confext images to enable for the unit. | |
| 224 | ||
| 225 | * nspawn: map foreign UID range through 1:1 | |
| 226 | ||
| 227 | * a small tool that can do basic btrfs raid policy mgmt. i.e. gets started as | |
| 228 | part of the initial transaction for some btrfs raid fs, waits for some time, | |
| 229 | then puts message on screen (plymouth, console) that some devices apparently | |
| 230 | are not showing up, then counts down, eventually set a flag somewhere, and | |
| 231 | retriggers the fs is was invoked for, which causes the udev rules to rerun | |
| 232 | that assemble the btrfs raid, but this time force degraded assembly. | |
| 233 | ||
| 234 | * systemd-repart: make useful to duplicate current OS onto a second disk, so | |
| 235 | that we can sanely copy ESP contents, /usr/ images, and then set up btrfs | |
| 236 | raid for the root fs to extend/mirror the existing install. This would be | |
| 237 | very similar to the concept of live-install-through-btrfs-migration. | |
| 238 | ||
| 239 | * introduce /etc/boottab or so which lists block devices that bootctl + | |
| 240 | kernel-install shall update the ESPs on (and register in EFI BootXYZ | |
| 241 | variables), in addition to whatever is currently the booted /usr/. | |
| 242 | systemd-sysupdate should also take it into consideration and update the | |
| 243 | /usr/ images on all listed devices. | |
| 244 | ||
| 245 | * replace all uses of fopen_temporary() by fopen_tmpfile_linkable() + | |
| 246 | flink_tmpfile() and then get rid of fopen_temporary(). Benefit: use O_TMPFILE | |
| 247 | pervasively, and avoid rename() wherever we can. | |
| 248 | ||
| 249 | * loginctl: show argv[] of "leader" process in tabular list-sessions output | |
| 250 | ||
| 251 | * loginctl: show "service identifier" in tabular list-sessions output, to make | |
| 252 | run0 sessions easily visible. | |
| 253 | ||
| 254 | * run0: maybe enable utmp for run0 sessions, so that they are easily visible. | |
| 255 | ||
| 256 | * maybe beef up sd-event: optionally, allow sd-event to query the timestamp of | |
| 257 | next pending datagram inside a SOCK_DGRAM IO fd, and order event source | |
| 258 | dispatching by that. Enable this on the native + syslog sockets in journald, | |
| 259 | so that we add correct ordering between the two. Use MSG_PEEK + SCM_TIMESTAMP | |
| 260 | for this. | |
| 261 | ||
| 262 | * bsod: add target "bsod.target" or so, which invokes systemd-bsod.target and | |
| 263 | waits and then reboots. Then use OnFailure=bsod.target from various jobs that | |
| 264 | should result in system reboots, such as TPM tamper detection cases. | |
| 265 | ||
| 266 | * honour validatefs xattrs in dissect-image.c too | |
| 267 | ||
| 268 | * pcrextend: maybe add option to disable measurements entirely via kernel cmdline | |
| 269 | ||
| 270 | * tpm2-setup: reboot if we detect SRK changed | |
| 271 | ||
| 272 | * validatefs: validate more things: check if image id + os id of initrd match | |
| 273 | target mount, so that we refuse early any attempts to boot into different | |
| 274 | images with the wrong kernels. check min/max kernel version too. all encoded | |
| 275 | via xattrs in the target fs. | |
| 276 | ||
| 277 | * pcrextend: when we fail to measure, reboot the system (at least optionally). | |
| 278 | important because certain measurements are supposed to "destroy" tpm object | |
| 279 | access. | |
| 280 | ||
| 281 | * pcrextend: after measuring get an immediate quote from the TPM, and validate | |
| 282 | it. if it doesn't check out, i.e. the measurement we made doesn't appear in | |
| 283 | the PCR then also reboot. | |
| 284 | ||
| 285 | * cryptsetup: add boolean for disabling use of any password/recovery key slots. | |
| 286 | (i.e. that we can operate in a tpm-only mode, and thus protect us from rogue | |
| 287 | root disks) | |
| 288 | ||
| 289 | * complete varlink introspection comments: | |
| 290 | - io.systemd.BootControl | |
| 291 | - io.systemd.Hostname | |
| 292 | - io.systemd.ManagedOOM | |
| 293 | - io.systemd.Network | |
| 294 | - io.systemd.PCRLock | |
| 295 | - io.systemd.Resolve.Monitor | |
| 296 | - io.systemd.Resolve | |
| 297 | - io.systemd.oom | |
| 298 | - io.systemd.sysext | |
| 299 | ||
| 300 | * maybe define a /etc/machine-info field for the ANSI color to associate with a | |
| 301 | hostname. Then use it for the shell prompt to highlight the hostname. If no | |
| 302 | color is explicitly set, hash a color automatically from the hostname as a | |
| 303 | fallback, in a reasonable way. Take inspiration from the ANSI_COLOR= field | |
| 304 | that already exists in /etc/os-release, i.e. use the same field name and | |
| 305 | syntax. When hashing the color, use the hsv_to_rgb() helper we already have, | |
| 306 | fixate S and V to something reasonable and constant, and derive the H from | |
| 307 | the hostname. Ultimate goal with this: give people a visual hint about the | |
| 308 | system they are on if the have many to deal with, by giving each a color | |
| 309 | identity. This code should be placed in hostnamed, so that clients can query | |
| 310 | the color via varlink or dbus. | |
| 311 | ||
| 312 | * unify how blockdev_get_root() and sysupdate find the default root block device | |
| 313 | ||
| 314 | * Maybe rename pkcs7 and public verbs of systemd-keyutil to be more verb like. | |
| 315 | ||
| 316 | * maybe extend the capsule concept to the per-user instance too: invokes a | |
| 317 | systemd --user instance with a subdir of $HOME as $HOME, and a subdir of | |
| 318 | $XDG_RUNTIME_DIR as $XDG_RUNTIME_DIR. | |
| 319 | ||
| 320 | * add "homectl export" and "homectl import" that gets you an "atomic" snapshot | |
| 321 | of your homedir, i.e. either a tarball or a snapshot of the underlying disk | |
| 322 | (use FREEZE/THAW to make it consistent, btrfs snapshots) | |
| 323 | ||
| 324 | * maybe introduce a new partition that we can store debug logs and similar at | |
| 325 | the very last moment of shutdown. idea would be to store reference to block | |
| 326 | device (major + minor + partition id + diskeq?) in /run somewhere, than use | |
| 327 | that from systemd-shutdown, just write a raw JSON blob into the partition. | |
| 328 | Include timestamp, boot id and such, plus kmsg. on next boot immediately | |
| 329 | import into journal. maybe use timestamp for making clock more monotonic. | |
| 330 | also use this to detect unclean shutdowns, boot into special target if | |
| 331 | detected | |
| 332 | ||
| 333 | * fix homed/homectl confusion around terminology, i.e. "home directory" | |
| 334 | vs. "home" vs. "home area". Stick to one term for the concept, and it | |
| 335 | probably shouldn't contain "area". | |
| 336 | ||
| 337 | * sd-boot: do something useful if we find exactly zero entries (ignoring items | |
| 338 | such as reboot/poweroff/factory reset). Show a help text or so. | |
| 339 | ||
| 340 | * sd-boot: optionally ask for confirmation before executing certain operations | |
| 341 | (e.g. factory resets, storagetm with world access, and so on) | |
| 342 | ||
| 343 | * add field to bls type 1 and type 2 profiles that ensures an item is never | |
| 344 | considered for automatic selection | |
| 345 | ||
| 346 | * add "conditions" for bls type 1 and type 2 profiles that allow suppressing | |
| 347 | them under various conditions: 1. if tpm2 is available or not available; | |
| 348 | 2. if sb is on or off; 3. if we are netbooted or not; … | |
| 349 | ||
| 350 | * logind: invoke a service manager for "area" logins too. i.e. instantiate | |
| 351 | user@.service also for logins where XDG_AREA is set, in per-area fashion, and | |
| 352 | ref count it properly. Benefit: graphical logins should start working with | |
| 353 | the area logic. | |
| 354 | ||
| 355 | * repart: introduce concept of "ghost" partitions, that we setup in almost all | |
| 356 | ways like other partitions, but do not actually register in the actual gpt | |
| 357 | table, but only tell the kernel about via BLKPG ioctl. These partitions are | |
| 358 | disk backed (hence can be large), but not persistent (as they are invisible | |
| 359 | on next boot). Could be used by live media and similar, to boot up as usual | |
| 360 | but automatically start at zero on each boot. There should also be a way to | |
| 361 | make ghost partitions properly persistent on request. | |
| 362 | ||
| 363 | * repart: introduce MigrateFileSystem= or so which is a bit like | |
| 364 | CopyFiles=/CopyBlocks= but operates via btrfs device logic: adds target as | |
| 365 | new device then removes source from btrfs. Usecase: a live medium which uses | |
| 366 | "ghost" partitions as suggested above, which can become persistent on request | |
| 367 | on another device. | |
| 368 | ||
| 369 | * make nspawn containers, portable services and vmspawn VMs optionally survive | |
| 370 | soft reboot wholesale. | |
| 371 | ||
| 372 | * Turn systemd-networkd-wait-online into a small varlink service that people | |
| 373 | can talk to and specify exactly what to wait for via a method call, and get a | |
| 374 | response back once that level of "online" is reached. | |
| 375 | ||
| 376 | * introduce a small "systemd-installer" tool or so, that glues | |
| 377 | systemd-repart-as-installer and bootctl-install into one. Would just | |
| 378 | interactively ask user for target disk (with completion and so on), and then do | |
| 379 | two varlink calls to the the two tools with the right parameters. To support | |
| 380 | "offline" operation, optionally invoke the two tools directly as child | |
| 381 | processes with varlink communication over socketpair(). This all should be | |
| 382 | useful as blueprint for graphical installers which should do the same. | |
| 383 | ||
| 384 | * Make run0 forward various signals to the forked process so that sending | |
| 385 | signals to a child process works roughly the same regardless of whether the | |
| 386 | child process is spawned via run0 or not. | |
| 387 | ||
| 388 | * write a document explaining how to write correct udev rules. Mention things | |
| 389 | such as: | |
| 390 | 1. do not do lists of vid/pid matches, use hwdb for that | |
| 391 | 2. add|change action matches are typically wrong, should be != remove | |
| 392 | 3. use GOTO, make rules short | |
| 393 | 4. people shouldn't try to make rules file non-world-readable | |
| 394 | ||
| 395 | * make killing more debuggable: when we kill a service do so setting the | |
| 396 | .si_code field with a little bit of info. Specifically, we can set a | |
| 397 | recognizable value to first of all indicate that it's systemd that did the | |
| 398 | killing. Secondly, we can give a reason for the killing, i.e. OOM or so, and | |
| 399 | also the phase we are in, and which process we think we are killing (i.e. | |
| 400 | main vs control process, useful in case of sd_notify() MAINPID= debugging). | |
| 401 | Net result: people who try to debug why their process gets killed should have | |
| 402 | some minimal, nice metadata directly on the signal event. | |
| 403 | ||
| 404 | * sd-boot/sd-stub: install a uefi "handle" to a sidecar dir of bls type #1 | |
| 405 | entries with an "uki" or "uki-url" stanza, and make sd-stub look for | |
| 406 | that. That way we can parameterize type #1 entries nicely. | |
| 407 | ||
| 408 | * add a system-wide seccomp filter list for syscalls, kill "acct()" "@obsolete" | |
| 409 | and a few other legacy syscalls that way. | |
| 410 | ||
| 411 | * maybe introduce "@icky" as a seccomp filter group, which contains acct() and | |
| 412 | certain other syscalls that aren't quite obsolete, but certainly icky. | |
| 413 | ||
| 414 | * revisit how we pass fs images and initrd to the kernel. take uefi http boot | |
| 415 | ramdisks as inspiration: for any confext/sysext/initrd erofs/DDI image simply | |
| 416 | generate a fake pmem region in the UEFI memory tables, that Linux then turns | |
| 417 | into /dev/pmemX. Then turn of cpio-based initrd logic in linux kernel, | |
| 418 | instead let kernel boot directly into /dev/pmem0. In order to allow our usual | |
| 419 | cpio-based parameterization, teach PID 1 to just uncompress cpio ourselves | |
| 420 | early on, from another pmem device. (Related to this, maybe introduce a new | |
| 421 | PE section .ramdisk that just synthesizes pmem devices from arbitrary | |
| 422 | blobs. Could be particularly useful in add-ons) | |
| 423 | ||
| 424 | * also parse out primary GPT disk label uuid from gpt partition device path at | |
| 425 | boot and pass it as efi var to OS. | |
| 426 | ||
| 427 | * storagetm: maybe also serve the specified disk via HTTP? we have glue for | |
| 428 | microhttpd anyway already. Idea would also be serve currently booted UKI as | |
| 429 | separate HTTP resource, so that EFI http boot on another system could | |
| 430 | directly boot from our system, with full access to the hdd. | |
| 431 | ||
| 432 | * support specifying download hash sum in systemd-import-generator expression | |
| 433 | to pin image/tarball. | |
| 434 | ||
| 435 | * support boot into nvme-over-tcp: add generator that allows specifying nvme | |
| 436 | devices on kernel cmdline + credentials. Also maybe add interactive mode | |
| 437 | (where the user is prompted for nvme info), in order to boot from other | |
| 438 | system's HDD. | |
| 439 | ||
| 440 | * ptyfwd: use osc context information in vmspawn/nspawn/… to optionally only | |
| 441 | listen to ^]]] key when no further vmspawn/nspawn context is allocated | |
| 442 | ||
| 443 | * ptyfwd: usec osc context information to propagate status messages from | |
| 444 | vmspawn/nspawn to service manager's "status" string, reporting what is | |
| 445 | currently in the fg | |
| 446 | ||
| 447 | * nspawn/vmspawn: define hotkey that one can hit on the primary interface to | |
| 448 | ask for a friendly, acpi style shutdown. | |
| 449 | ||
| 450 | * for better compat with major clouds: implement simple PTP device support in | |
| 451 | timesyncd | |
| 452 | ||
| 453 | * for better compat with major clouds: recognize clouds via hwdb on DMI device, | |
| 454 | and add udev properties to it that help with handling IMDS, i.e. entrypoint | |
| 455 | URL, which fields to find ip hostname, ssh key, … | |
| 456 | ||
| 457 | * for better compat with major clouds: introduce imds mini client service that | |
| 458 | sets up primary netif in a private netns (ipvlan?) to query imds without | |
| 459 | affecting rest of the host. pick up literal credentials from there plus the | |
| 460 | fields the hwdb reports for the other fields and turn them into credentials. | |
| 461 | then write generator that used detected virtualization info and plugs this | |
| 462 | service into the early boot, waiting for the DMI and network device to show | |
| 463 | up. | |
| 464 | ||
| 465 | * Add UKI profile conditioning so that profles are only available if secure | |
| 466 | boot is turned off, or only on. similar, add conditions on TPM availability, | |
| 467 | network boot, and other conditions. | |
| 468 | ||
| 469 | * fix bug around run0 background color on ls in fresh terminal | |
| 470 | ||
| 471 | * Reset TPM2 DA bit on each successful boot | |
| 472 | ||
| 473 | * systemd-repart: add --installer or so, that will intractively ask for a | |
| 474 | target disk, maybe ask for confirmation, and install something on disk. Then, | |
| 475 | hook that into installer.target or so, so that it can be used to | |
| 476 | install/replicate installs | |
| 477 | ||
| 478 | * systemd-cryptenroll: add --firstboot or so, that will interactively ask user | |
| 479 | whether recovery key shall be enrolled and do so | |
| 480 | ||
| 481 | * bootctl: add tool for registering BootXXX entry that boots from some http | |
| 482 | server of your choice (i.e. like kernel-bootcfg --add-uri=) | |
| 483 | ||
| 484 | * maybe introduce container-shell@.service or so, to match | |
| 485 | container-getty.service but skips authentication, so you get a shell prompt | |
| 486 | directly. Usecase: wsl-like stuff (they have something pretty much like | |
| 487 | that). Question: how to pick user for this. Instance parameter? somehow from | |
| 488 | credential (would probably require some binary that converts credential to | |
| 489 | User= parameter? | |
| 490 | ||
| 491 | * systemd-firstboot: optionally install an ssh key for root for offline use. | |
| 492 | ||
| 493 | * Allocate UIDs/GIDs automatically in userdbctl load-credentials if none are | |
| 494 | included in the user/group record credentials | |
| 495 | ||
| 496 | * introduce new ANSI sequence for communicating log level and structured error | |
| 497 | metadata to terminals. | |
| 498 | ||
| 499 | * in pid1: include ExecStart= cmdlines (and other Exec*= cmdlines) in polkit | |
| 500 | request, so that policies can match against command lines. | |
| 501 | ||
| 502 | * allow dynamic modifications of ConcurrencyHardMax= and ConcurrencySoftMax= | |
| 503 | via DBus (and with that also by daemon-reload) | |
| 504 | ||
| 505 | * sysupdated: introduce per-user version that can update per-user installed dDIs | |
| 506 | ||
| 507 | * portabled: similar | |
| 508 | ||
| 509 | * resolved: make resolved process DNR DHCP info | |
| 510 | ||
| 511 | * maybe introduce an OSC sequence that signals when we ask for a password, so | |
| 512 | that terminal emulators can maybe connect a password manager or so, and | |
| 513 | highlight things specially. | |
| 514 | ||
| 515 | * start using STATX_SUBVOL in btrfs_is_subvol(). Also, make use of it | |
| 516 | generically, so that image discovery recognizes bcachefs subvols too. | |
| 517 | ||
| 518 | * foreign uid: | |
| 519 | - add support to export-fs, import-fs | |
| 520 | - systemd-dissect should learn mappings, too, when doing mtree and such | |
| 521 | ||
| 522 | * format-table: introduce new cell type for strings with ansi sequences in | |
| 523 | them. display them in regular output mode (via strip_tab_ansi()), but | |
| 524 | suppress them in json mode. | |
| 525 | ||
| 526 | * resolved: report ttl in resolution replies if we know it. This data is useful | |
| 527 | for tools such as wireguard which want to periodically re-resolve DNS names, | |
| 528 | and might want to use the TTL has hint for that. | |
| 529 | ||
| 530 | * journald: beef up ClientContext logic to store pidfd_id of peer, to validate | |
| 531 | we really use the right cache entry | |
| 532 | ||
| 533 | * journald: log client's pidfd id as a new automatic field _PIDFDID= or so. | |
| 534 | ||
| 535 | * journald: split up ClientContext cache in two: one cache keyed by pid/pidfdid | |
| 536 | with process information, and another one keyed by cgroup path/cgroupid with | |
| 537 | cgroup information. This way if a service consisting of many logging | |
| 538 | processes can take benefit of the cgroup caching. | |
| 539 | ||
| 540 | * system lsmbpf policy that prohibits creating files owned by "nobody" | |
| 541 | system-wide | |
| 542 | ||
| 543 | * system lsmpbf policy that prohibits creating or opening device nodes outside | |
| 544 | of devtmpfs/tmpfs, except if they are the pseudo-devices /dev/null, | |
| 545 | /dev/zero, /dev/urandom and so on. | |
| 546 | ||
| 547 | * system lsmbpf policy that enforces that block device backed mounts may only | |
| 548 | be established on top of dm-crypt or dm-verity devices, or an allowlist of | |
| 549 | file systems (which should probably include vfat, for compat with the ESP) | |
| 550 | ||
| 551 | * $SYSTEMD_EXECPID that the service manager sets should | |
| 552 | be augmented with $SYSTEMD_EXECPIDFD (and similar for | |
| 553 | other env vars we might send). | |
| 554 | ||
| 555 | * port copy.c over to use LabelOps for all labelling. | |
| 556 | ||
| 557 | * get rid of compat with libidn.so.11 (retain only for libidn.so.12) | |
| 558 | ||
| 559 | * get rid of compat with libbpf.so.0 (retainly only for libbpf.so.1) | |
| 560 | ||
| 561 | * define a generic "report" varlink interface, which services can implement to | |
| 562 | provide health/statistics data about themselves. then define a dir somewhere | |
| 563 | in /run/ where components can bind such sockets. Then make journald, logind, | |
| 564 | and pid1 itself implement this and expose various stats on things there. Then | |
| 565 | issue parallel calls to these interfaces from the systemd-report tool, | |
| 566 | combine into one json document, and include measurement logs and tpm | |
| 567 | quote. tpm quote should protect the json doc via the nonce field | |
| 568 | studd. Allow shipping this off elsewhere for analyze. | |
| 569 | ||
| 570 | * The bind(AF_UNSPEC) construct (for resetting sockets to their initial state) | |
| 571 | should be blocked in many cases because it punches holes in many sandboxes. | |
| 572 | ||
| 573 | * find a nice way to opt-in into auto-masking SIGCHLD on first | |
| 574 | sd_event_add_child(), and then get rid of many more explicit sigprocmask() | |
| 575 | calls. | |
| 576 | ||
| 577 | * introduce new structure Tpm2CombinedPolicy, that combines the various TPm2 | |
| 578 | policy bits into one structure, i.e. public key info, pcr masks, pcrlock | |
| 579 | stuff, pin and so on. Then pass that around in tpm2_seal() and tpm2_unseal(). | |
| 580 | ||
| 581 | * look at nsresourced, mountfsd, homed, importd, and try to come up with a way | |
| 582 | how the forked off worker processes can be moved into transient services with | |
| 583 | sandboxing, without breaking notify socket stuff and so on. | |
| 584 | ||
| 585 | * replace all \x1b, \x1B, \033 C string escape sequences in our codebase with a | |
| 586 | more readable \e. It's a GNU extension, but a ton more readable than the | |
| 587 | others, and most importantly it doesn't result in confusing errors if you | |
| 588 | suffix the escape sequence with one more decimal digit, because compilers | |
| 589 | think you might actually specify a value outside the 8bit range with that. | |
| 590 | ||
| 591 | * confext/sysext: instead of mounting the overlayfs directly on /etc/ + /usr/, | |
| 592 | insert an intermediary bind mount on itself there. This has the benefit that | |
| 593 | services where mount propagation from the root fs is off, an still have | |
| 594 | confext/sysext propagated in. | |
| 595 | ||
| 596 | * generic interface for varlink for setting log level and stuff that all our daemons can implement | |
| 597 | ||
| 598 | * maybe teach repart.d/ dropins a new setting MakeMountNodes= or so, which is | |
| 599 | just like MakeDirectories=, but uses an access mode of 0000 and sets the +i | |
| 600 | chattr bit. This is useful as protection against early uses of /var/ or /tmp/ | |
| 601 | before their contents is mounted. | |
| 602 | ||
| 603 | * go through all uses of table_new() in our codebase, and make sure we support | |
| 604 | all three of: | |
| 605 | 1. --no-legend properly | |
| 606 | 2. --json= properly | |
| 607 | 3. --no-pager properly | |
| 608 | ||
| 609 | * go through all --help texts in our codebases, and make sure: | |
| 610 | 1. the one sentence description of the tool is highlighted via ANSI how we | |
| 611 | usually do it | |
| 612 | 2. If more than one or two commands are supported (as opposed to switches), | |
| 613 | separate commands + switches from each other, using underlined --help sections. | |
| 614 | 3. If there are many switches, consider adding additional --help sections. | |
| 615 | ||
| 616 | * go through our codebase, and convert "vertical tables" (i.e. things such as | |
| 617 | "systemctl status") to use table_new_vertical() for output | |
| 618 | ||
| 619 | * pcrlock: add support for multi-profile UKIs | |
| 620 | ||
| 621 | * initrd: when transitioning from initrd to host, validate that | |
| 622 | /lib/modules/`uname -r` exists, refuse otherwise | |
| 623 | ||
| 624 | * signed bpf loading: to address need for signature verification for bpf | |
| 625 | programs when they are loaded, and given the bpf folks don't think this is | |
| 626 | realistic in kernel space, maybe add small daemon that facilitates this | |
| 627 | loading on request of clients, validates signatures and then loads the | |
| 628 | programs. This daemon should be the only daemon with privs to do load BPF on | |
| 629 | the system. It might be a good idea to run this daemon already in the initrd, | |
| 630 | and leave it around during the initrd transition, to continue serve requests. | |
| 631 | Should then live in its own fs namespace that inherits from the initrd's | |
| 632 | fs tree, not from the host, to isolate it properly. Should set | |
| 633 | PR_SET_DUMPABLE so that it cannot be ptraced from the host. Should have | |
| 634 | CAP_SYS_BPF as only service around. | |
| 635 | ||
| 636 | * add a mechanism we can drop capabilities from pid1 *before* transitioning | |
| 637 | from initrd to host. i.e. before we transition into the slightly lower trust | |
| 638 | domain that is the host systems we might want to get rid of some caps. | |
| 639 | Example: CAP_SYS_BPF in the signed bpf loading logic above. (We already have | |
| 640 | CapabilityBoundingSet= in system.conf, but that is enforced when pid 1 | |
| 641 | initializes, rather then when it transitions to the next.) | |
| 642 | ||
| 643 | * maybe add a new standard slice where process that are started in the initrd | |
| 644 | and stick around for the whole system runtime (i.e. root fs storage daemons, | |
| 645 | the bpf loader daemon discussed above, and such) are placed. maybe | |
| 646 | protected.slice or so? Then write docs that suggest that services like this | |
| 647 | set Slice=protected.sice, RefuseManualStart=yes, RefuseManualStop=yes and a | |
| 648 | couple of other things. | |
| 649 | ||
| 650 | * rough proposed implementation design for remote attestation infra: add a tool | |
| 651 | that generates a quote of local PCRs and NvPCRs, along with synchronous log | |
| 652 | snapshot. use "audit session" logic for that, so that we get read-outs and | |
| 653 | signature in one step. Then turn this into a JSON object. Use the "TCG TSS 2.0 | |
| 654 | JSON Data Types and Policy Language" format to encode the signature. And CEL | |
| 655 | for the measurement log. | |
| 656 | ||
| 657 | * creds: add a new cred format that reused the JSON structures we use in the | |
| 658 | LUKS header, so that we get the various newer policies for free. | |
| 659 | ||
| 660 | * systemd-analyze: port "pcrs" verb to talk directly to TPM device, instead of | |
| 661 | using sysfs interface (well, or maybe not, as that would require privileges?) | |
| 662 | ||
| 663 | * pcrextend/tpm2-util: add a concept of "rotation" to event log. i.e. allow | |
| 664 | trailing parts of the logs if time or disk space limit is hit. Protect the | |
| 665 | boot-time measurements however (i.e. up to some point where things are | |
| 666 | settled), since we need those for pcrlock measurements and similar. When | |
| 667 | deleting entries for rotation, place an event that declares how many items | |
| 668 | have been dropped, and what the hash before and after that. | |
| 669 | ||
| 670 | * measure information about all DDIs as we activate them to an NvPCR. We | |
| 671 | probably should measure the dm-verity root hash from the kernel side, but | |
| 672 | DDI meta info from userspace. | |
| 673 | ||
| 674 | * use name_to_handle_at() with AT_HANDLE_FID instead of .st_ino (inode | |
| 675 | number) for identifying inodes, for example in copy.c when finding hard | |
| 676 | links, or loop-util.c for tracking backing files, and other places. | |
| 677 | ||
| 678 | * cryptenroll/cryptsetup/homed: add unlock mechanism that combines tpm2 and | |
| 679 | fido2, as well as tpm2 + ssh-agent, inspired by ChromeOS' logic: encrypt the | |
| 680 | volume key with the TPM, with a policy that insists that a nonce is signed by | |
| 681 | the fido2 device's key or ssh-agent key. Thus, add unlock/login time the TPM | |
| 682 | generates a nonce, which is sent as a challenge to the fido2/ssh-agent, which | |
| 683 | returns a signature which is handed to the tpm, which then reveals the volume | |
| 684 | key to the PC. | |
| 685 | ||
| 686 | * cryptenroll/cryptsetup/homed: similar to this, implement TOTP backed by TPM. | |
| 687 | ||
| 688 | * expose the handoff timestamp fully via the D-Bus properties that contain | |
| 689 | ExecStatus information | |
| 690 | ||
| 691 | * properly serialize the ExecStatus data from all ExecCommand objects | |
| 692 | associated with services, sockets, mounts and swaps. Currently, the data is | |
| 693 | flushed out on reload, which is quite a limitation. | |
| 694 | ||
| 695 | * Clean up "reboot argument" handling, i.e. set it through some IPC service | |
| 696 | instead of directly via /run/, so that it can be sensible set remotely. | |
| 697 | ||
| 698 | * systemd-tpm2-support: add a some logic that detects if system is in DA | |
| 699 | lockout mode, and queries the user for TPM recovery PIN then. | |
| 700 | ||
| 701 | * systemd-repart should probably enable btrfs' "temp_fsid" feature for all file | |
| 702 | systems it creates, as we have no interest in RAID for repart, and it should | |
| 703 | make sure that we can mount them trivially everywhere. | |
| 704 | ||
| 705 | * systemd-nspawn should get the same SSH key support that vmspawn now has. | |
| 706 | ||
| 707 | * move documentation about our common env vars (SYSTEMD_LOG_LEVEL, | |
| 708 | SYSTEMD_PAGER, …) into a man page of its own, and just link it from our | |
| 709 | various man pages that so far embed the whole list again and again, in an | |
| 710 | attempt to reduce clutter and noise a bid. | |
| 711 | ||
| 712 | * vmspawn switch default swtpm PCR bank to SHA384-only (away from SHA256), at | |
| 713 | least on 64bit archs, simply because SHA384 is typically double the hashing | |
| 714 | speed than SHA256 on 64bit archs (since based on 64bit words unlike SHA256 | |
| 715 | which uses 32bit words). | |
| 716 | ||
| 717 | * In vmspawn/nspawn/machined wait for X_SYSTEMD_UNIT_ACTIVE=ssh-active.target | |
| 718 | and X_SYSTEMD_SIGNALS_LEVEL=2 as indication whether/when SSH and the POSIX | |
| 719 | signals are available. Similar for D-Bus (but just use sockets.target for | |
| 720 | that). Report as property for the machine. | |
| 721 | ||
| 722 | * teach nspawn/machined a new bus call/verb that gets you a | |
| 723 | shell in containers that have no sensible pid1, via joining the container, | |
| 724 | and invoking a shell directly. Then provide another new bus call/vern that is | |
| 725 | somewhat automatic: if we detect that pid1 is running and fully booted up we | |
| 726 | provide a proper login shell, otherwise just a joined shell. Then expose that | |
| 727 | as primary way into the container. | |
| 728 | ||
| 729 | * make vmspawn/nspawn/importd/machined a bit more usable in a WSL-like | |
| 730 | fashion. i.e. teach unpriv systemd-vmspawn/systemd-nspawn a reasonable | |
| 731 | --bind-user= behaviour that mounts the calling user through into the | |
| 732 | machine. Then, ship importd with a small database of well known distro images | |
| 733 | along with their pinned signature keys. Then add some minimal glue that binds | |
| 734 | this together: downloads a suitable image if not done so yet, starts it in | |
| 735 | the bg via vmspawn/nspawn if not done so yet and then requests a shell inside | |
| 736 | it for the invoking user. | |
| 737 | ||
| 738 | * add a new specifier to unit files that figures out the DDI the unit file is | |
| 739 | from, tracing through overlayfs, DM, loopback block device. | |
| 740 | ||
| 741 | * importd/importctl | |
| 742 | - complete varlink interface | |
| 743 | - download images into .v/ dirs | |
| 744 | ||
| 745 | * in os-release define a field that can be initialized at build time from | |
| 746 | SOURCE_DATE_EPOCH (maybe even under that name?). Would then be used to | |
| 747 | initialize the timestamp logic of ConditionNeedsUpdate=. | |
| 748 | ||
| 749 | * nspawn/vmspawn/pid1: add ability to easily insert fully booted VMs/FOSC into | |
| 750 | shell pipelines, i.e. add easy to use switch that turns off console status | |
| 751 | output, and generates the right credentials for systemd-run-generator so that | |
| 752 | a program is invoked, and its output captured, with correct EOF handling and | |
| 753 | exit code propagation | |
| 754 | ||
| 755 | * Introduce a CGroupRef structure, inspired by PidRef. Should contain cgroup | |
| 756 | path, cgroup id, and cgroup fd. Use it to continuously pin all v2 cgroups via | |
| 757 | a cgroup_ref field in the CGroupRuntime structure. Eventually switch things | |
| 758 | over to do all cgroupfs access only via that structure's fd. | |
| 759 | ||
| 760 | * Get rid of the symlinks in /run/systemd/units/* and exclusively use cgroupfs | |
| 761 | xattrs to convey info about invocation ids, logging settings and so on. | |
| 762 | support for cgroupfs xattrs in the "trusted." namespace was added in linux | |
| 763 | 3.7, i.e. which we don't pretend to support anymore. | |
| 764 | ||
| 765 | * rewrite bpf-devices in libbpf/C code, rather than home-grown BPF assembly, to | |
| 766 | match bpf-restrict-fs, bpf-restrict-ifaces, bpf-socket-bind | |
| 767 | ||
| 768 | * ditto: rewrite bpf-firewall in libbpf/C code | |
| 769 | ||
| 770 | * credentials: if we ever acquire a secure way to derive cgroup id of socket | |
| 771 | peers (i.e. SO_PEERCGROUPID), then extend the "scoped" credential logic to | |
| 772 | allow cgroup-scoped (i.e. app or service scoped) credentials. Then, as next | |
| 773 | step use this to implement per-app/per-service encrypted directories, where | |
| 774 | we set up fscrypt on the StateDirectory= with a randomized key which is | |
| 775 | stored as xattr on the directory, encrypted as a credential. | |
| 776 | ||
| 777 | * credentials: optionally include a per-user secret in scoped user-credential | |
| 778 | encryption keys. should come from homed in some way, derived from the luks | |
| 779 | volume key or fscrypt directory key. | |
| 780 | ||
| 781 | * credentials: add a flag to the scoped credentials that if set require PK | |
| 782 | reauthentication when unlocking a secret. | |
| 783 | ||
| 784 | * credentials: rework docs. The list in | |
| 785 | https://systemd.io/CREDENTIALS/#well-known-credentials is very stale. | |
| 786 | Document credentials in individual man pages, generate list as in | |
| 787 | systemd.directives. | |
| 788 | ||
| 789 | * extend the smbios11 logic for passing credentials so that instead of passing | |
| 790 | the credential data literally it can also just reference an AF_VSOCK CID/port | |
| 791 | to read them from. This way the data doesn't remain in the SMBIOS blob during | |
| 792 | runtime, but only in the credentials fs. | |
| 793 | ||
| 794 | * machined: optionally track nspawn unix-export/ runtime for each machined, and | |
| 795 | then update systemd-ssh-proxy so that it can connect to that. | |
| 796 | ||
| 797 | * introduce mntid_t, and make it 64bit, as apparently the kernel switched to | |
| 798 | 64bit mount ids | |
| 799 | ||
| 800 | * mountfsd/nsresourced | |
| 801 | - userdb: maybe allow callers to map one uid to their own uid | |
| 802 | - bpflsm: allow writes if resulting UID on disk would be userns' owner UID | |
| 803 | - make encrypted DDIs work (password…) | |
| 804 | - add API for creating a new file system from scratch (together with some | |
| 805 | dm-integrity/HMAC key). Should probably work using systemd-repart (access | |
| 806 | via varlink). | |
| 807 | - add api to make an existing file "trusted" via dm-integry/HMAC key | |
| 808 | - port: portabled | |
| 809 | - port: tmpfiles, sysusers and similar | |
| 810 | - lets see if we can make runtime bind mounts into unpriv nspawn work | |
| 811 | ||
| 812 | * add a kernel cmdline switch (and cred?) for marking a system to be | |
| 813 | "headless", in which case we never open /dev/console for reading, only for | |
| 814 | writing. This would then mean: systemd-firstboot would process creds but not | |
| 815 | ask interactively, getty would not be started and so on. | |
| 816 | ||
| 817 | * cryptsetup: new crypttab option to auto-grow a luks device to its backing | |
| 818 | partition size. new crypttab option to reencrypt a luks device with a new | |
| 819 | volume key. | |
| 820 | ||
| 821 | * we probably should have some infrastructure to acquire sysexts with | |
| 822 | drivers/firmware for local hardware automatically. Idea: reuse the modalias | |
| 823 | logic of the kernel for this: make the main OS image install a hwdb file | |
| 824 | that matches against local modalias strings, and adds properties to relevant | |
| 825 | devices listing names of sysexts needed to support the hw. Then provide some | |
| 826 | tool that goes through all devices and tries to acquire/download the | |
| 827 | specified images. | |
| 828 | ||
| 829 | * repart + cryptsetup: support file systems that are encrypted and use verity | |
| 830 | on top. Usecase: confexts that shall be signed by the admin but also be | |
| 831 | confidential. Then, add a new --make-ddi=confext-encrypted for this. | |
| 832 | ||
| 833 | * tmpfiles: add new line type for moving files from some source dir to some | |
| 834 | target dir. then use that to move sysexts/confexts and stuff from initrd | |
| 835 | tmpfs to /run/, so that host can pick things up. | |
| 836 | ||
| 837 | * tiny varlink service that takes a fd passed in and serves it via http. Then | |
| 838 | make use of that in networkd, and expose some EFI binary of choice for | |
| 839 | DHCP/HTTP base EFI boot. | |
| 840 | ||
| 841 | * bootctl: add reboot-to-disk which takes a block device name, and | |
| 842 | automatically sets things up so that system reboots into that device next. | |
| 843 | ||
| 844 | * maybe: in PID1, when we detect we run in an initrd, make superblock read-only | |
| 845 | early on, but provide opt-out via kernel cmdline. | |
| 846 | ||
| 847 | * systemd-pcrextend: | |
| 848 | - support measuring to nvindex with PCR update semantics ("fake PCRs") | |
| 849 | - add api for "allocating" such an nvindex | |
| 850 | - once we have that start measuring every sysext we apply, every confext, | |
| 851 | every RootImage= we apply, every nspawn and so on. All in separate fake | |
| 852 | PCRs. | |
| 853 | ||
| 854 | * vmspawn: | |
| 855 | - --ephemeral support | |
| 856 | - --read-only support | |
| 857 | - automatically suspend/resume the VM if the host suspends. Use logind | |
| 858 | suspend inhibitor to implement this. request clean suspend by generating | |
| 859 | suspend key presses. | |
| 860 | - support for "real" networking via "-n" and --network-bridge= | |
| 861 | - translate SIGTERM to clean ACPI shutdown event | |
| 862 | - implement hotkeys ^]^]r and ^]^]p like nspawn | |
| 863 | ||
| 864 | * systemd-pcrmachine should probably also measure the SMBIOS system UUID. | |
| 865 | ||
| 866 | * storagetm: | |
| 867 | - add USB mass storage device logic, so that all local disks are also exposed | |
| 868 | as mass storage devices on systems that have a USB controller that can | |
| 869 | operate in device mode | |
| 870 | - add NVMe authentication | |
| 871 | ||
| 872 | * add support for activating nvme-oF devices at boot automatically via kernel | |
| 873 | cmdline, and maybe even support a syntax such as | |
| 874 | root=nvme:<trtype>:<traddr>:<trsvcid>:<nqn>:<partition> to boot directly from | |
| 875 | nvme-oF | |
| 876 | ||
| 877 | * pcrlock: | |
| 878 | - add kernel-install plugin that automatically creates UKI .pcrlock file when | |
| 879 | UKI is installed, and removes it when it is removed again | |
| 880 | - automatically install PE measurement of sd-boot on "bootctl install" | |
| 881 | - pre-calc sysext + kernel cmdline measurements | |
| 882 | - pre-calc cryptsetup root key measurement | |
| 883 | - maybe make systemd-repart generate .pcrlock for old and new GPT header in | |
| 884 | /run? | |
| 885 | - Add support for more than 8 branches per PCR OR | |
| 886 | - add "systemd-pcrlock lock-kernel-current" or so which synthesizes .pcrlock | |
| 887 | policy from currently booted kernel/event log, to close gap for first boot | |
| 888 | for pre-built images | |
| 889 | ||
| 890 | * in sd-boot and sd-stub measure the SMBIOS vendor strings to some PCR (at | |
| 891 | least some subset of them that look like systemd stuff), because apparently | |
| 892 | some firmware does not, but systemd honours it. avoid duplicate measurement | |
| 893 | by sd-boot and sd-stub by adding LoaderFeatures/StubFeatures flag for this, | |
| 894 | so that sd-stub can avoid it if sd-boot already did it. | |
| 895 | ||
| 896 | * cryptsetup: a mechanism that allows signing a volume key with some key that | |
| 897 | has to be present in the kernel keyring, or similar, to ensure that confext | |
| 898 | DDIs can be encrypted against the local SRK but signed with the admin's key | |
| 899 | and thus can authenticated locally before they are decrypted. | |
| 900 | ||
| 901 | * image policy should be extended to allow dictating *how* a disk is unlocked, | |
| 902 | i.e. root=encrypted-tpm2+encrypted-fido2 would mean "root fs must be | |
| 903 | encrypted and unlocked via fido2 or tpm2, but not otherwise" | |
| 904 | ||
| 905 | * systemd-repart: add support for formatting dm-crypt + dm-integrity file | |
| 906 | systems. | |
| 907 | ||
| 908 | * homed: use systemd-storagetm to expose home dirs via nvme-tcp. Then, | |
| 909 | teach homed/pam_systemd_homed with a user name such as | |
| 910 | lennart%nvme_tcp_192.168.100.77_8787 to log in from any linux host with the | |
| 911 | same home dir. Similar maybe for nbd, iscsi? this should then first ask for | |
| 912 | the local root pw, to authenticate that logging in like this is ok, and would | |
| 913 | then be followed by another password prompt asking for the user's own | |
| 914 | password. Also, do something similar for CIFS: if you log in via | |
| 915 | lennart%cifs-someserver_someshare, then set up the homed dir for it | |
| 916 | automatically. The PAM module should update the user name used for login to | |
| 917 | the short version once it set up the user. Some care should be taken, so that | |
| 918 | the long version can be still be resolved via NSS afterwards, to deal with | |
| 919 | PAM clients that do not support PAM sessions where PAM_USER changes half-way. | |
| 920 | ||
| 921 | * redefine /var/lib/extensions/ as the dir one can place all three of sysext, | |
| 922 | confext as well is multi-modal DDIs that qualify as both. Then introduce | |
| 923 | /var/lib/sysexts/ which can be used to place only DDIs that shall be used as | |
| 924 | sysext | |
| 925 | ||
| 926 | * Varlinkification of the following command line tools, to open them up to | |
| 927 | other programs via IPC: | |
| 928 | - bootctl | |
| 929 | - journalctl (allowing journal read access via IPC) | |
| 930 | - coredumpcl | |
| 931 | - systemd-bless-boot | |
| 932 | - systemd-measure | |
| 933 | - systemd-cryptenroll (to allow UIs to enroll FIDO2 keys and such) | |
| 934 | - systemd-dissect | |
| 935 | - systemd-sysupdate | |
| 936 | - systemd-analyze | |
| 937 | - kernel-install | |
| 938 | - systemd-mount (with PK so that desktop environments could use it to mount disks) | |
| 939 | ||
| 940 | * enumerate virtiofs devices during boot-up in a generator, and synthesize | |
| 941 | mounts for rootfs, /usr/, /home/, /srv/ and some others from it, depending on | |
| 942 | the "tag". (waits for: https://gitlab.com/virtio-fs/virtiofsd/-/issues/128) | |
| 943 | ||
| 944 | * automatically mount one virtiofs during early boot phase to /run/host/, | |
| 945 | similar to how we do that for nspawn, based on some clear tag. | |
| 946 | ||
| 947 | * add some service that makes an atomic snapshot of PCR state and event log up | |
| 948 | to that point available, possibly even with quote by the TPM. | |
| 949 | ||
| 950 | * encode type1 entries in some UKI section to add additional entries to the | |
| 951 | menu. | |
| 952 | ||
| 953 | * Add ACL-based access management to .socket units. i.e. add AllowPeerUser= + | |
| 954 | AllowPeerGroup= that installs additional user/group ACL entries on AF_UNIX | |
| 955 | sockets. | |
| 956 | ||
| 957 | * systemd-tpm2-setup should support a mode where we refuse booting if the SRK | |
| 958 | changed. (Must be opt-in, to not break systems which are supposed to be | |
| 959 | migratable between PCs) | |
| 960 | ||
| 961 | * when systemd-sysext learns mutable /usr/ (and systemd-confext mutable /etc/) | |
| 962 | then allow them to store the result in a .v/ versioned subdir, for some basic | |
| 963 | snapshot logic | |
| 964 | ||
| 965 | * add a new PE binary section ".mokkeys" or so which sd-stub will insert into | |
| 966 | Mok keyring, by overriding/extending whatever shim sets in the EFI | |
| 967 | var. Benefit: we can extend the kernel module keyring at ukify time, | |
| 968 | i.e. without recompiling the kernel, taking an upstream OS' kernel and adding | |
| 969 | a local key to it. | |
| 970 | ||
| 971 | * PidRef conversion work: | |
| 972 | - cg_pid_get_xyz() | |
| 973 | - pid_from_same_root_fs() | |
| 974 | - get_ctty_devnr() | |
| 975 | - actually wait for POLLIN on pidref's pidfd in service logic | |
| 976 | - openpt_allocate_in_namespace() | |
| 977 | - unit_attach_pid_to_cgroup_via_bus() | |
| 978 | - cg_attach() – requires new kernel feature | |
| 979 | - journald's process cache | |
| 980 | ||
| 981 | * ddi must be listed as block device fstype | |
| 982 | ||
| 983 | * measure some string via pcrphase whenever we end up booting into emergency | |
| 984 | mode. | |
| 985 | ||
| 986 | * similar, measure some string via pcrphase whenever we resume from hibernate | |
| 987 | ||
| 988 | * homed: add a basic form of secrets management to homed, that stores | |
| 989 | secrets in $HOME somewhere, is protected by the accounts own authentication | |
| 990 | mechanisms. Should implement something PKCS#11-like that can be used to | |
| 991 | implement emulated FIDO2 in unpriv userspace on top (which should happen | |
| 992 | outside of homed), emulated PKCS11, and libsecrets support. Operate with a | |
| 993 | 2nd key derived from volume key of the user, with which to wrap all | |
| 994 | keys. maintain keys in kernel keyring if possible. | |
| 995 | ||
| 996 | * use sd-event ratelimit feature optionally for journal stream clients that log | |
| 997 | too much | |
| 998 | ||
| 999 | * systemd-mount should only consider modern file systems when mounting, similar | |
| 1000 | to systemd-dissect | |
| 1001 | ||
| 1002 | * add another PE section ".fname" or so that encodes the intended filename for | |
| 1003 | PE file, and validate that when loading add-ons and similar before using | |
| 1004 | it. This is particularly relevant when we load multiple add-ons and want to | |
| 1005 | sort them to apply them in a define order. The order should not be under | |
| 1006 | control of the attacker. | |
| 1007 | ||
| 1008 | * also include packaging metadata (á la | |
| 1009 | https://systemd.io/PACKAGE_METADATA_FOR_EXECUTABLE_FILES/) in our UEFI PE | |
| 1010 | binaries, using the same JSON format. | |
| 1011 | ||
| 1012 | * make "bootctl install" + "bootctl update" useful for installing shim too. For | |
| 1013 | that introduce new dir /usr/lib/systemd/efi/extra/ which we copy mostly 1:1 | |
| 1014 | into the ESP at install time. Then make the logic smart enough so that we | |
| 1015 | don't overwrite bootx64.efi with our own if the extra tree already contains | |
| 1016 | one. Also, follow symlinks when copying, so that shim rpm can symlink their | |
| 1017 | stuff into our dir (which is safe since the target ESP is generally VFAT and | |
| 1018 | thus does not have symlinks anyway). Later, teach the update logic to look at | |
| 1019 | the ELF package metadata (which we also should include in all PE files, see | |
| 1020 | above) for version info in all *.EFI files, and use it to only update if | |
| 1021 | newer. | |
| 1022 | ||
| 1023 | * in sd-stub: optionally add support for a new PE section .keyring or so that | |
| 1024 | contains additional certificates to include in the Mok keyring, extending | |
| 1025 | what shim might have placed there. why? let's say I use "ukify" to build + | |
| 1026 | sign my own fedora-based UKIs, and only enroll my personal lennart key via | |
| 1027 | shim. Then, I want to include the fedora keyring in it, so that kmods work. | |
| 1028 | But I might not want to enroll the fedora key in shim, because this would | |
| 1029 | also mean that the key would be in effect whenever I boot an archlinux UKI | |
| 1030 | built the same way, signed with the same lennart key. | |
| 1031 | ||
| 1032 | * resolved: take possession of some IPv6 ULA address (let's say | |
| 1033 | fd00:5353:5353:5353:5353:5353:5353:5353), and listen on port 53 on it for the | |
| 1034 | local stubs, so that we can make the stub available via ipv6 too. | |
| 1035 | ||
| 1036 | * Maybe add SwitchRootEx() as new bus call that takes env vars to set for new | |
| 1037 | PID 1 as argument. When adding SwitchRootEx() we should maybe also add a | |
| 1038 | flags param that allows disabling and enabling whether serialization is | |
| 1039 | requested during switch root. | |
| 1040 | ||
| 1041 | * introduce a .acpitable section for early ACPI table override | |
| 1042 | ||
| 1043 | * add proper .osrel matching for PE addons. i.e. refuse applying an addon | |
| 1044 | intended for a different OS. Take inspiration from how confext/sysext are | |
| 1045 | matched against OS. | |
| 1046 | ||
| 1047 | * figure out what to do about credentials sealed to PCRs in kexec + soft-reboot | |
| 1048 | scenarios. Maybe insist sealing is done additionally against some keypair in | |
| 1049 | the TPM to which access is updated on each boot, for the next, or so? | |
| 1050 | ||
| 1051 | * logind: when logging in, always take an fd to the home dir, to keep the dir | |
| 1052 | busy, so that autofs release can never happen. (this is generally a good | |
| 1053 | idea, and specifically works around the fact the autofs ignores busy by mount | |
| 1054 | namespaces) | |
| 1055 | ||
| 1056 | * mount most file systems with a restrictive uidmap. e.g. mount /usr/ with a | |
| 1057 | uidmap that blocks out anything outside 0…1000 (i.e. system users) and similar. | |
| 1058 | ||
| 1059 | * mount the root fs with MS_NOSUID by default, and then mount /usr/ without | |
| 1060 | both so that suid executables can only be placed there. Do this already in | |
| 1061 | the initrd. If /usr/ is not split out create a bind mount automatically. | |
| 1062 | ||
| 1063 | * fix our various hwdb lookup keys to end with ":" again. The original idea was | |
| 1064 | that hwdb patterns can match arbitrary fields with expressions like | |
| 1065 | "*:foobar:*", to wildcard match both the start and the end of the string. | |
| 1066 | This only works safely for later extensions of the string if the strings | |
| 1067 | always end in a colon. This requires updating our udev rules, as well as | |
| 1068 | checking if the various hwdb files are fine with that. | |
| 1069 | ||
| 1070 | * mount /tmp/ and /var/tmp with a uidmap applied that blocks out "nobody" user | |
| 1071 | among other things such as dynamic uid ranges for containers and so on. That | |
| 1072 | way no one can create files there with these uids and we enforce they are only | |
| 1073 | used transiently, never persistently. | |
| 1074 | ||
| 1075 | * rework loopback support in fstab: when "loop" option is used, then | |
| 1076 | instantiate a new systemd-loop@.service for the source path, set the | |
| 1077 | lo_file_name field for it to something recognizable derived from the fstab | |
| 1078 | line, and then generate a mount unit for it using a udev generated symlink | |
| 1079 | based on lo_file_name. | |
| 1080 | ||
| 1081 | * teach systemd-nspawn the boot assessment logic: hook up vpick's try counters | |
| 1082 | with success notifications from nspawn payloads. When this is enabled, | |
| 1083 | automatically support reverting back to older OS version images if newer ones | |
| 1084 | fail to boot. | |
| 1085 | ||
| 1086 | * implement new "systemd-fsrebind" tool that works like gpt-auto-generator but | |
| 1087 | looks at a root dir and then applies vpick on various dirs/images to pick a | |
| 1088 | root tree, a /usr/ tree, a /home/, a /srv/, a /var/ tree and so on. Dirs | |
| 1089 | could also be btrfs subvols (combine with btrfs auto-snapshort approach for | |
| 1090 | creating versions like these automatically). | |
| 1091 | ||
| 1092 | * remove tomoyo support, it's obsolete and unmaintained apparently | |
| 1093 | ||
| 1094 | * In .socket units, add ConnectStream=, ConnectDatagram=, | |
| 1095 | ConnectSequentialPacket= that create a socket, and then *connect to* rather than | |
| 1096 | listen on some socket. Then, add a new setting WriteData= that takes some | |
| 1097 | base64 data that systemd will write into the socket early on. This can then | |
| 1098 | be used to create connections to arbitrary services and issue requests into | |
| 1099 | them, as long as the data is static. This can then be combined with the | |
| 1100 | aforementioned journald subscription varlink service, to enable | |
| 1101 | activation-by-message id and similar. | |
| 1102 | ||
| 1103 | * .service with invalid Sockets= starts successfully. | |
| 1104 | ||
| 1105 | * landlock: lock down RuntimeDirectory= via landlock, so that services lose | |
| 1106 | ability to write anywhere else below /run/. Similar for | |
| 1107 | StateDirectory=. Benefit would be clear delegation via unit files: services | |
| 1108 | get the directories they get, and nothing else even if they wanted to. | |
| 1109 | ||
| 1110 | * landlock: for unprivileged systemd (i.e. systemd --user), use landlock to | |
| 1111 | implement ProtectSystem=, ProtectHome= and so on. Landlock does not require | |
| 1112 | privs, and we can implement pretty similar behaviour. Also, maybe add a mode | |
| 1113 | where ProtectSystem= combined with an explicit PrivateMounts=no could request | |
| 1114 | similar behaviour for system services, too. | |
| 1115 | ||
| 1116 | * Add systemd-mount@.service which is instantiated for a block device and | |
| 1117 | invokes systemd-mount and exits. This is then useful to use in | |
| 1118 | ENV{SYSTEMD_WANTS} in udev rules, and a bit prettier than using RUN+= | |
| 1119 | ||
| 1120 | * udevd: extend memory pressure logic: also kill any idle worker processes | |
| 1121 | ||
| 1122 | * udevadm: to make symlink querying with udevadm nicer: | |
| 1123 | - do not enable the pager for queries like 'udevadm info -q symlink -r' | |
| 1124 | - add mode with newlines instead of spaces (for grep)? | |
| 1125 | ||
| 1126 | * SIGRTMIN+18 and memory pressure handling should still be added to: hostnamed, | |
| 1127 | localed, oomd, timedated. | |
| 1128 | ||
| 1129 | * repart/gpt-auto/DDIs: maybe introduce a concept of "extension" partitions, | |
| 1130 | that have a new type uuid and can "extend" earlier partitions, to work around | |
| 1131 | the fact that systemd-repart can only grow the last partition defined. During | |
| 1132 | activation we'd simply set up a dm-linear mapping to merge them again. A | |
| 1133 | partition that is to be extended would just set a bit in the partition flags | |
| 1134 | field to indicate that there's another extension partition to look for. The | |
| 1135 | identifying UUID of the extension partition would be hashed in counter mode | |
| 1136 | from the uuid of the original partition it extends. Inspiration for this is | |
| 1137 | the "dynamic partitions" concept of new Android. This would be a minimalistic | |
| 1138 | concept of a volume manager, with the extents it manages being exposes as GPT | |
| 1139 | partitions. I a partition is extended multiple times they should probably | |
| 1140 | grow exponentially in size to ensure O(log(n)) time for finding them on | |
| 1141 | access. | |
| 1142 | ||
| 1143 | * Make nspawn to a frontend for systemd-executor, so that we have to ways into | |
| 1144 | the executor: via unit files/dbus/varlink through PID1 and via cmdline/OCI | |
| 1145 | through nspawn. | |
| 1146 | ||
| 1147 | * sd-stub: detect if we are running with uefi console output on serial, and if so | |
| 1148 | automatically add console= to kernel cmdline matching the same port. | |
| 1149 | ||
| 1150 | * add a utility that can be used with the kernel's | |
| 1151 | CONFIG_STATIC_USERMODEHELPER_PATH and then handles them within pid1 so that | |
| 1152 | security, resource management and cgroup settings can be enforced properly | |
| 1153 | for all umh processes. | |
| 1154 | ||
| 1155 | * homed: when resizing an fs don't sync identity beforehand there might simply | |
| 1156 | not be enough disk space for that. try to be defensive and sync only after | |
| 1157 | resize. | |
| 1158 | ||
| 1159 | * homed: if for some reason the partition ended up being much smaller than | |
| 1160 | whole disk, recover from that, and grow it again. | |
| 1161 | ||
| 1162 | * timesyncd: when saving/restoring clock try to take boot time into account. | |
| 1163 | Specifically, along with the saved clock, store the current boot ID. When | |
| 1164 | starting, check if the boot id matches. If so, don't do anything (we are on | |
| 1165 | the same boot and clock just kept running anyway). If not, then read | |
| 1166 | CLOCK_BOOTTIME (which started at boot), and add it to the saved clock | |
| 1167 | timestamp, to compensate for the time we spent booting. If EFI timestamps are | |
| 1168 | available, also include that in the calculation. With this we'll then only | |
| 1169 | miss the time spent during shutdown after timesync stopped and before the | |
| 1170 | system actually reset. | |
| 1171 | ||
| 1172 | * systemd-stub: maybe store a "boot counter" in the ESP, and pass it down to | |
| 1173 | userspace to allow ordering boots (for example in journalctl). The counter | |
| 1174 | would be monotonically increased on every boot. | |
| 1175 | ||
| 1176 | * pam_systemd_home: add module parameter to control whether to only accept | |
| 1177 | only password or only pcks11/fido2 auth, and then use this to hook nicely | |
| 1178 | into two of the three PAM stacks gdm provides. | |
| 1179 | See discussion at https://github.com/authselect/authselect/pull/311 | |
| 1180 | ||
| 1181 | * maybe prohibit setuid() to the nobody user, to lock things down, via seccomp. | |
| 1182 | the nobody is not a user any code should run under, ever, as that user would | |
| 1183 | possibly get a lot of access to resources it really shouldn't be getting | |
| 1184 | access to due to the userns + nfs semantics of the user. Alternatively: use | |
| 1185 | the seccomp log action, and allow it. | |
| 1186 | ||
| 1187 | * systemd-gpt-auto-generator: add kernel cmdline option to override block | |
| 1188 | device to dissect. also support dissecting a regular file. useccase: include | |
| 1189 | encrypted/verity root fs in UKI. | |
| 1190 | ||
| 1191 | * sd-stub: add ".bootcfg" section for kernel bootconfig data (as per | |
| 1192 | https://docs.kernel.org/admin-guide/bootconfig.html) | |
| 1193 | ||
| 1194 | * tpm2: add (optional) support for generating a local signing key from PCR 15 | |
| 1195 | state. use private key part to sign PCR 7+14 policies. stash signatures for | |
| 1196 | expected PCR7+14 policies in EFI var. use public key part in disk encryption. | |
| 1197 | generate new sigs whenever db/dbx/mok/mokx gets updated. that way we can | |
| 1198 | securely bind against SecureBoot/shim state, without having to renroll | |
| 1199 | everything on each update (but we still have to generate one sig on each | |
| 1200 | update, but that should be robust/idempotent). needs rollback protection, as | |
| 1201 | usual. | |
| 1202 | ||
| 1203 | * Lennart: big blog story about DDIs | |
| 1204 | ||
| 1205 | * Lennart: big blog story about building initrds | |
| 1206 | ||
| 1207 | * Lennart: big blog story about "why systemd-boot" | |
| 1208 | ||
| 1209 | * bpf: see if we can use BPF to solve the syslog message cgroup source problem: | |
| 1210 | one idea would be to patch source sockaddr of all AF_UNIX/SOCK_DGRAM to | |
| 1211 | implicitly contain the source cgroup id. Another idea would be to patch | |
| 1212 | sendto()/connect()/sendmsg() sockaddr on-the-fly to use a different target | |
| 1213 | sockaddr. | |
| 1214 | ||
| 1215 | * bpf: see if we can address opportunistic inode sharing of immutable fs images | |
| 1216 | with BPF. i.e. if bpf gives us power to hook into openat() and return a | |
| 1217 | different inode than is requested for which we however it has same contents | |
| 1218 | then we can use that to implement opportunistic inode sharing among DDIs: | |
| 1219 | make all DDIs ship xattr on all reg files with a SHA256 hash. Then, also | |
| 1220 | dictate that DDIs should come with a top-level subdir where all reg files are | |
| 1221 | linked into by their SHA256 sum. Then, whenever an inode is opened with the | |
| 1222 | xattr set, check bpf table to find dirs with hashes for other prior DDIs and | |
| 1223 | try to use inode from there. | |
| 1224 | ||
| 1225 | * extend the verity signature partition to permit multiple signatures for the | |
| 1226 | same root hash, so that people can sign a single image with multiple keys. | |
| 1227 | ||
| 1228 | * consider adding a new partition type, just for /opt/ for usage in system | |
| 1229 | extensions | |
| 1230 | ||
| 1231 | * dissection policy should enforce that unlocking can only take place by | |
| 1232 | certain means, i.e. only via pw, only via tpm2, or only via fido, or a | |
| 1233 | combination thereof. | |
| 1234 | ||
| 1235 | * make the systemd-repart "seed" value provisionable via credentials, so that | |
| 1236 | confidential computing environments can set it and deterministically | |
| 1237 | enforce the uuids for partitions created, so that they can calculate PCR 15 | |
| 1238 | ahead of time. | |
| 1239 | ||
| 1240 | * systemd-repart: also derive the volume key from the seed value, for the | |
| 1241 | aforementioned purpose. | |
| 1242 | ||
| 1243 | * in the initrd: derive the default machine ID to pass to the host PID 1 via | |
| 1244 | $machine_id from the same seed credential. | |
| 1245 | ||
| 1246 | * Add systemd-sysupdate-initrd.service or so that runs systemd-sysupdate in the | |
| 1247 | initrd to bootstrap the initrd to populate the initial partitions. Some things | |
| 1248 | to figure out: | |
| 1249 | - Should it run on firstboot or on every boot? | |
| 1250 | - If run on every boot, should it use the sysupdate config from the host on | |
| 1251 | subsequent boots? | |
| 1252 | ||
| 1253 | * To mimic the new tpm2-measure-pcr= crypttab option add the same to veritytab | |
| 1254 | (measuring the root hash) and integritytab (measuring the HMAC key if one is | |
| 1255 | used) | |
| 1256 | ||
| 1257 | * We should start measuring all services, containers, and system extensions we | |
| 1258 | activate. probably into PCR 13. i.e. add --tpm2-measure-pcr= or so to | |
| 1259 | systemd-nspawn, and MeasurePCR= to unit files. Should contain a measurement | |
| 1260 | of the activated configuration and the image that is being activated (in case | |
| 1261 | verity is used, hash of the root hash). | |
| 1262 | ||
| 1263 | * bootspec: permit graceful "update" from type #2 to type #1. If both a type #1 | |
| 1264 | and a type #2 entry exist under otherwise the exact same name, then use the | |
| 1265 | type #1 entry, and ignore the type #2 entry. This way, people can "upgrade" | |
| 1266 | from the UKI with all parameters baked in to a Type #1 .conf file with manual | |
| 1267 | parametrization, if needed. This matches our usual rule that admin config | |
| 1268 | should win over vendor defaults. | |
| 1269 | ||
| 1270 | * write a "search path" spec, that documents the prefixes to search in | |
| 1271 | (i.e. the usual /etc/, /run/, /usr/lib/ dance, potentially /usr/etc/), how to | |
| 1272 | sort found entries, how masking works and overriding. | |
| 1273 | ||
| 1274 | * automatic boot assessment: add one more default success check that just waits | |
| 1275 | for a bit after boot, and blesses the boot if the system stayed up that long. | |
| 1276 | ||
| 1277 | * systemd-repart: add support for generating ISO9660 images | |
| 1278 | ||
| 1279 | * systemd-repart: in addition to the existing "factory reset" mode (which | |
| 1280 | simply empties existing partitions marked for that). add a mode where | |
| 1281 | partitions marked for it are entirely removed. Use case: remove secondary OS | |
| 1282 | copy, and redundant partitions entirely, and recreate them anew. | |
| 1283 | ||
| 1284 | * systemd-boot: maybe add support for collapsing menu entries of the same OS | |
| 1285 | into one item that can be opened (like in a "tree view" UI element) or | |
| 1286 | collapsed. If only a single OS is installed, disable this mode, but if | |
| 1287 | multiple OSes are installed might make sense to default to it, so that user | |
| 1288 | is not immediately bombarded with a multitude of Linux kernel versions but | |
| 1289 | only one for each OS. | |
| 1290 | ||
| 1291 | * systemd-repart: if the GPT *disk* UUID (i.e. the one global for the entire | |
| 1292 | disk) is set to all FFFFF then use this as trigger for factory reset, in | |
| 1293 | addition to the existing mechanisms via EFI variables and kernel command | |
| 1294 | line. Benefit: works also on non-EFI systems, and can be requested on one | |
| 1295 | boot, for the next. | |
| 1296 | ||
| 1297 | * systemd-sysupdate: make transport pluggable, so people can plug casync or | |
| 1298 | similar behind it, instead of http. | |
| 1299 | ||
| 1300 | * systemd-tmpfiles: add concept for conditionalizing lines on factory reset | |
| 1301 | boot, or on first boot. | |
| 1302 | ||
| 1303 | * we probably needs .pcrpkeyrd or so as additional PE section in UKIs, | |
| 1304 | which contains a separate public key for PCR values that only apply in the | |
| 1305 | initrd, i.e. in the boot phase "enter-initrd". Then, consumers in userspace | |
| 1306 | can easily bind resources to just the initrd. Similar, maybe one more for | |
| 1307 | "enter-initrd:leave-initrd" for resources that shall be accessible only | |
| 1308 | before unprivileged user code is allowed. (we only need this for .pcrpkey, | |
| 1309 | not for .pcrsig, since the latter is a list of signatures anyway). With that, | |
| 1310 | when you enroll a LUKS volume or similar, pick either the .pcrkey (for | |
| 1311 | coverage through all phases of the boot, but excluding shutdown), the | |
| 1312 | .pcrpkeyrd (for coverage in the initrd only) and .pcrpkeybt (for coverage | |
| 1313 | until users are allowed to log in). | |
| 1314 | ||
| 1315 | * Once the root fs LUKS volume key is measured into PCR 15, default to binding | |
| 1316 | credentials to PCR 15 in "systemd-creds" | |
| 1317 | ||
| 1318 | * add support for asymmetric LUKS2 TPM based encryption. i.e. allow preparing | |
| 1319 | an encrypted image on some host given a public key belonging to a specific | |
| 1320 | other host, so that only hosts possessing the private key in the TPM2 chip | |
| 1321 | can decrypt the volume key and activate the volume. Use case: systemd-confext | |
| 1322 | for a central orchestrator to generate confext images securely that can only | |
| 1323 | be activated on one specific host (which can be used for installing a bunch | |
| 1324 | of creds in /etc/credstore/ for example). Extending on this: allow binding | |
| 1325 | LUKS2 TPM based encryption also to the TPM2 internal clock. Net result: | |
| 1326 | prepare a confext image that can only be activated on a specific host that | |
| 1327 | runs a specific software in a specific time window. confext would be | |
| 1328 | automatically invalidated outside of it. | |
| 1329 | ||
| 1330 | * maybe add a "systemd-report" tool, that generates a TPM2-backed "report" of | |
| 1331 | current system state, i.e. a combination of PCR information, local system | |
| 1332 | time and TPM clock, running services, recent high-priority log | |
| 1333 | messages/coredumps, system load/PSI, signed by the local TPM chip, to form an | |
| 1334 | enhanced remote attestation quote. Use case: a simple orchestrator could use | |
| 1335 | this: have the report tool upload these reports every 3min somewhere. Then | |
| 1336 | have the orchestrator collect these reports centrally over a 3min time | |
| 1337 | window, and use them to determine what which node should now start/stop what, | |
| 1338 | and generate a small confext for each node, that uses Uphold= to pin services | |
| 1339 | on each node. The confext would be encrypted using the asymmetric encryption | |
| 1340 | proposed above, so that it can only be activated on the specific host, if the | |
| 1341 | software is in a good state, and within a specific time frame. Then run a | |
| 1342 | loop on each node that sends report to orchestrator and then sysupdate to | |
| 1343 | update confext. Orchestrator would be stateless, i.e. operate on desired | |
| 1344 | config and collected reports in the last 3min time window only, and thus can | |
| 1345 | be trivially scaled up since all instances of the orchestrator should come to | |
| 1346 | the same conclusions given the same inputs of reports/desired workload info. | |
| 1347 | Could also be used to deliver Wireguard secrets and thus to clients, thus | |
| 1348 | permitting zero-trust networking: secrets are rolled over via confext updates, | |
| 1349 | and via the time window TPM logic invalidated if node doesn't keep itself | |
| 1350 | updated, or becomes corrupted in some way. | |
| 1351 | ||
| 1352 | * in the initrd, once the rootfs encryption key has been measured to PCR 15, | |
| 1353 | derive default machine ID to use from it, and pass it to host PID 1. | |
| 1354 | ||
| 1355 | * sd-boot: for each installed OS, grey out older entries (i.e. all but the | |
| 1356 | newest), to indicate they are obsolete | |
| 1357 | ||
| 1358 | * automatically propagate LUKS password credential into cryptsetup from host | |
| 1359 | (i.e. SMBIOS type #11, …), so that one can unlock LUKS via VM hypervisor | |
| 1360 | supplied password. | |
| 1361 | ||
| 1362 | * add ability to path_is_valid() to classify paths that refer to a dir from | |
| 1363 | those which may refer to anything, and use that in various places to filter | |
| 1364 | early. i.e. stuff ending in "/", "/." and "/.." definitely refers to a | |
| 1365 | directory, and paths ending that way can be refused early in many contexts. | |
| 1366 | ||
| 1367 | * systemd-measure: add --pcrpkey-auto as an alternative to --pcrpkey=, where it | |
| 1368 | would just use the same public key specified with --public-key= (or the one | |
| 1369 | automatically derived from --private-key=). | |
| 1370 | ||
| 1371 | * Add "purpose" flag to partition flags in discoverable partition spec that | |
| 1372 | indicate if partition is intended for sysext, for portable service, for | |
| 1373 | booting and so on. Then, when dissecting DDI allow specifying a purpose to | |
| 1374 | use as additional search condition. Use case: images that combined a sysext | |
| 1375 | partition with a portable service partition in one. | |
| 1376 | ||
| 1377 | * On boot, auto-generate an asymmetric key pair from the TPM, | |
| 1378 | and use it for validating DDIs and credentials. Maybe upload it to the kernel | |
| 1379 | keyring, so that the kernel does this validation for us for verity and kernel | |
| 1380 | modules | |
| 1381 | ||
| 1382 | * lock down acceptable encrypted credentials at boot, via simple allowlist, | |
| 1383 | maybe on kernel command line: | |
| 1384 | systemd.import_encrypted_creds=foobar.waldo,tmpfiles.extra to protect locked | |
| 1385 | down kernels from credentials generated on the host with a weak kernel | |
| 1386 | ||
| 1387 | * Merge systemd-creds options --uid= (which accepts user names) and --user. | |
| 1388 | ||
| 1389 | * Add support for extra verity configuration options to systemd-repart (FEC, | |
| 1390 | hash type, etc) | |
| 1391 | ||
| 1392 | * chase(): take inspiration from path_extract_filename() and return | |
| 1393 | O_DIRECTORY if input path contains trailing slash. | |
| 1394 | ||
| 1395 | * document in boot loader spec that symlinks in XBOOTLDR/ESP are not OK even if | |
| 1396 | non-VFAT fs is used. | |
| 1397 | ||
| 1398 | * measure credentials picked up from SMBIOS to some suitable PCR | |
| 1399 | ||
| 1400 | * measure GPT and LUKS headers somewhere when we use them (i.e. in | |
| 1401 | systemd-gpt-auto-generator/systemd-repart and in systemd-cryptsetup?) | |
| 1402 | ||
| 1403 | * pick up creds from EFI vars | |
| 1404 | ||
| 1405 | * Add and pickup tpm2 metadata for creds structure. | |
| 1406 | ||
| 1407 | * sd-boot: we probably should include all BootXY EFI variable defined boot | |
| 1408 | entries in our menu, and then suppress ourselves. Benefit: instant | |
| 1409 | compatibility with all other OSes which register things there, in particular | |
| 1410 | on other disks. Always boot into them via NextBoot EFI variable, to not | |
| 1411 | affect PCR values. | |
| 1412 | ||
| 1413 | * systemd-measure tool: | |
| 1414 | - pre-calculate PCR 12 (command line) + PCR 13 (sysext) the same way we can precalculate PCR 11 | |
| 1415 | ||
| 1416 | * sd-device: add an API for acquiring list of child devices, given a device | |
| 1417 | objects (i.e. all child dirents that dirs or symlinks to dirs) | |
| 1418 | ||
| 1419 | * sd-device: maybe pin the sysfs dir with an fd, during the entire runtime of | |
| 1420 | an sd_device, then always work based on that. | |
| 1421 | ||
| 1422 | * maybe add new flags to gpt partition tables for rootfs and usrfs indicating | |
| 1423 | purpose, i.e. whether something is supposed to be bootable in a VM, on | |
| 1424 | baremetal, on an nspawn-style container, if it is a portable service image, | |
| 1425 | or a sysext for initrd, for host os, or for portable container. Then hook | |
| 1426 | portabled/… up to udev to watch block devices coming up with the flags set, and | |
| 1427 | use it. | |
| 1428 | ||
| 1429 | * sd-boot should look for information what to boot in SMBIOS, too, so that VM | |
| 1430 | managers can tell sd-boot what to boot into and suchlike | |
| 1431 | ||
| 1432 | * add "systemd-sysext identify" verb, that you can point on any file in /usr/ | |
| 1433 | and that determines from which overlayfs layer it originates, which image, and with | |
| 1434 | what it was signed. | |
| 1435 | ||
| 1436 | * systemd-creds: extend encryption logic to support asymmetric | |
| 1437 | encryption/authentication. Idea: add new verb "systemd-creds public-key" | |
| 1438 | which generates a priv/pub key pair on the TPM2 and stores the priv key | |
| 1439 | locally in /var. It then outputs a certificate for the pub part to stdout. | |
| 1440 | This can then be copied/taken elsewhere, and can be used for encrypting creds | |
| 1441 | that only the host on its specific hw can decrypt. Then, support a drop-in | |
| 1442 | dir with certificates that can be used to authenticate credentials. Flow of | |
| 1443 | operations is then this: build image with owner certificate, then after | |
| 1444 | boot up issue "systemd-creds public-key" to acquire pubkey of the machine. | |
| 1445 | Then, when passing data to the machine, sign with privkey belonging to one of | |
| 1446 | the dropped in certs and encrypted with machine pubkey, and pass to machine. | |
| 1447 | Machine is then able to authenticate you, and confidentiality is guaranteed. | |
| 1448 | ||
| 1449 | * building on top of the above, the pub/priv key pair generated on the TPM2 | |
| 1450 | should probably also one you can use to get a remote attestation quote. | |
| 1451 | ||
| 1452 | * Process credentials in: | |
| 1453 | • crypttab-generator: allow defining additional crypttab-like volumes via | |
| 1454 | credentials (similar: verity-generator, integrity-generator). Use | |
| 1455 | fstab-generator logic as inspiration. | |
| 1456 | • run-generator: allow defining additional commands to run via a credential | |
| 1457 | • resolved: allow defining additional /etc/hosts entries via a credential (it | |
| 1458 | might make sense to then synthesize a new combined /etc/hosts file in /run | |
| 1459 | and bind mount it on /etc/hosts for other clients that want to read it. | |
| 1460 | • repart: allow defining additional partitions via credential | |
| 1461 | • timesyncd: pick NTP server info from credential | |
| 1462 | • portabled: read a credential "portable.extra" or so, that takes a list of | |
| 1463 | file system paths to enable on start. | |
| 1464 | • make systemd-fstab-generator look for a system credential encoding root= or | |
| 1465 | usr= | |
| 1466 | • in gpt-auto-generator: check partition uuids against such uuids supplied via | |
| 1467 | sd-stub credentials. That way, we can support parallel OS installations with | |
| 1468 | pre-built kernels. | |
| 1469 | ||
| 1470 | * define a JSON format for units, separating out unit definitions from unit | |
| 1471 | runtime state. Then, expose it: | |
| 1472 | ||
| 1473 | 1. Add Describe() method to Unit D-Bus object that returns a JSON object | |
| 1474 | about the unit. | |
| 1475 | 2. Expose this natively via Varlink, in similar style | |
| 1476 | 3. Use it when invoking binaries (i.e. make PID 1 fork off systemd-executor | |
| 1477 | binary which reads the JSON definition and runs it), to address the cow | |
| 1478 | trap issue and the fact that NSS is actually forbidden in | |
| 1479 | forked-but-not-exec'ed children | |
| 1480 | 4. Add varlink API to run transient units based on provided JSON definitions | |
| 1481 | ||
| 1482 | * Add SUPPORT_END_URL= field to os-release with more *actionable* information | |
| 1483 | what to do if support ended | |
| 1484 | ||
| 1485 | * pam_systemd: on interactive logins, maybe show SUPPORT_END information at | |
| 1486 | login time, à la motd | |
| 1487 | ||
| 1488 | * sd-boot: instead of unconditionally deriving the ESP to search boot loader | |
| 1489 | spec entries in from the paths of sd-boot binary, let's optionally allow it | |
| 1490 | to be configured on sd-boot cmdline + efi var. Use case: embed sd-boot in the | |
| 1491 | UEFI firmware (for example, ovmf supports that via qemu cmdline option), and | |
| 1492 | use it to load stuff from the ESP. | |
| 1493 | ||
| 1494 | * mount /var/ from initrd, so that we can apply sysext and stuff before the | |
| 1495 | initrd transition. Specifically: | |
| 1496 | 1. There should be a var= kernel cmdline option, matching root= and usr= | |
| 1497 | 2. systemd-gpt-auto-generator should auto-mount /var if it finds it on disk | |
| 1498 | 3. mount.x-initrd mount option in fstab should be implied for /var | |
| 1499 | ||
| 1500 | * make persistent restarts easier by adding a new setting OpenPersistentFile= | |
| 1501 | or so, which allows opening one or more files that is "persistent" across | |
| 1502 | service restarts, hot reboot, cold reboots (depending on configuration): the | |
| 1503 | files are created empty on first invocation, and on subsequent invocations | |
| 1504 | the files are reboot. The files would be backed by tmpfs, pmem or /var | |
| 1505 | depending on desired level of persistency. | |
| 1506 | ||
| 1507 | * sd-event: add ability to "chain" event sources. Specifically, add a call | |
| 1508 | sd_event_source_chain(x, y), which will automatically enable event source y | |
| 1509 | in oneshot mode once x is triggered. Use case: in src/core/mount.c implement | |
| 1510 | the /proc/self/mountinfo rescan on SIGCHLD with this: whenever a SIGCHLD is | |
| 1511 | seen, trigger the rescan defer event source automatically, and allow it to be | |
| 1512 | dispatched *before* the SIGCHLD is handled (based on priorities). Benefit: | |
| 1513 | dispatch order is strictly controlled by priorities again. (next step: chain | |
| 1514 | event sources to the ratelimit being over) | |
| 1515 | ||
| 1516 | * if we fork of a service with StandardOutput=journal, and it forks off a | |
| 1517 | subprocess that quickly dies, we might not be able to identify the cgroup it | |
| 1518 | comes from, but we can still derive that from the stdin socket its output | |
| 1519 | came from. We apparently don't do that right now. | |
| 1520 | ||
| 1521 | * add PR_SET_DUMPABLE service setting | |
| 1522 | ||
| 1523 | * homed/userdb: maybe define a "companion" dir for home directories where apps | |
| 1524 | can safely put privileged stuff in. Would not be writable by the user, but | |
| 1525 | still conceptually belong to the user. Would be included in user's quota if | |
| 1526 | possible, even if files are not owned by UID of user. Use case: container | |
| 1527 | images that owned by arbitrary UIDs, and are owned/managed by the users, but | |
| 1528 | are not directly belonging to the user's UID. Goal: we shouldn't place more | |
| 1529 | privileged dirs inside of unprivileged dirs, and thus containers really | |
| 1530 | should not be placed inside of traditional UNIX home dirs (which are owned by | |
| 1531 | users themselves) but somewhere else, that is separate, but still close | |
| 1532 | by. Inform user code about path to this companion dir via env var, so that | |
| 1533 | container managers find it. the ~/.identity file is also a candidate for a | |
| 1534 | file to move there, since it is managed by privileged code (i.e. homed) and | |
| 1535 | not unprivileged code. | |
| 1536 | ||
| 1537 | * maybe add support for binding and connecting AF_UNIX sockets in the file | |
| 1538 | system outside of the 108ch limit. When connecting, open O_PATH fd to socket | |
| 1539 | inode first, then connect to /proc/self/fd/XYZ. When binding, create symlink | |
| 1540 | to target dir in /tmp, and bind through it. | |
| 1541 | ||
| 1542 | * add a proper concept of a "developer" mode, i.e. where cryptographic | |
| 1543 | protections of the root OS are weakened after interactive confirmation, to | |
| 1544 | allow hackers to allow their own stuff. idea: allow entering developer mode | |
| 1545 | only via explicit choice in boot menu: i.e. add explicit boot menu item for | |
| 1546 | it. When developer mode is entered, generate a key pair in the TPM2, and add | |
| 1547 | the public part of it automatically to keychain of valid code signature keys | |
| 1548 | on subsequent boots. Then provide a tool to sign code with the key in the | |
| 1549 | TPM2. Ensure that boot menu item is the only way to enter developer mode, by | |
| 1550 | binding it to locality/PCRs so that keys cannot be generated otherwise. | |
| 1551 | ||
| 1552 | * services: add support for cryptographically unlocking per-service directories | |
| 1553 | via TPM2. Specifically, for StateDirectory= (and related dirs) use fscrypt to | |
| 1554 | set up the directory so that it can only be accessed if host and app are in | |
| 1555 | order. | |
| 1556 | ||
| 1557 | * update HACKING.md to suggest developing systemd with the ideas from: | |
| 1558 | https://0pointer.net/blog/testing-my-system-code-in-usr-without-modifying-usr.html | |
| 1559 | https://0pointer.net/blog/running-an-container-off-the-host-usr.html | |
| 1560 | ||
| 1561 | * sd-event: compat wd reuse in inotify code: keep a set of removed watch | |
| 1562 | descriptors, and clear this set piecemeal when we see the IN_IGNORED event | |
| 1563 | for it, or when read() returns EAGAIN or on IN_Q_OVERFLOW. Then, whenever we | |
| 1564 | see an inotify wd event check against this set, and if it is contained ignore | |
| 1565 | the event. (to be fully correct this would have to count the occurrences, in | |
| 1566 | case the same wd is reused multiple times before we start processing | |
| 1567 | IN_IGNORED again) | |
| 1568 | ||
| 1569 | * for vendor-built signed initrds: | |
| 1570 | - kernel-install should be able to install encrypted creds automatically for | |
| 1571 | machine id, root pw, rootfs uuid, resume partition uuid, and place next to | |
| 1572 | EFI kernel, for sd-stub to pick them up. These creds should be locked to | |
| 1573 | the TPM, and bind to the right PCR the kernel is measured to. | |
| 1574 | - kernel-install should be able to pick up initrd sysexts automatically and | |
| 1575 | place them next to EFI kernel, for sd-stub to pick them up. | |
| 1576 | - systemd-fstab-generator should look for rootfs device to mount in creds | |
| 1577 | - systemd-resume-generator should look for resume partition uuid in creds | |
| 1578 | ||
| 1579 | * Maybe extend the service protocol to support handling of some specific SIGRT | |
| 1580 | signal for setting service log level, that carries the level via the | |
| 1581 | sigqueue() data parameter. Enable this via unit file setting. | |
| 1582 | ||
| 1583 | * sd_notify/vsock: maybe support binding to AF_VSOCK in Type=notify services, | |
| 1584 | then passing $NOTIFY_SOCKET and $NOTIFY_GUESTCID with PID1's cid (typically | |
| 1585 | fixed to "2", i.e. the official host cid) and the expected guest cid, for the | |
| 1586 | two sides of the channel. The latter env var could then be used in an | |
| 1587 | appropriate qemu cmdline. That way qemu payloads could talk sd_notify() | |
| 1588 | directly to host service manager. | |
| 1589 | ||
| 1590 | * sd-device should return the devnum type (i.e. 'b' or 'c') via some API for an | |
| 1591 | sd_device object, so that data passed into sd_device_new_from_devnum() can | |
| 1592 | also be queried. | |
| 1593 | ||
| 1594 | * sd-event: optionally, if per-event source rate limit is hit, downgrade | |
| 1595 | priority, but leave enabled, and once ratelimit window is over, upgrade | |
| 1596 | priority again. That way we can combat event source starvation without | |
| 1597 | stopping processing events from one source entirely. | |
| 1598 | ||
| 1599 | * sd-event: similar to existing inotify support add fanotify support (given | |
| 1600 | that apparently new features in this area are only going to be added to the | |
| 1601 | latter). | |
| 1602 | ||
| 1603 | * sd-event: add 1st class event source for clock changes | |
| 1604 | ||
| 1605 | * sd-event: add 1st class event source for timezone changes | |
| 1606 | ||
| 1607 | * sysext: measure all activated sysext into a TPM PCR | |
| 1608 | ||
| 1609 | * systemd-dissect: show available versions inside of a disk image, i.e. if | |
| 1610 | multiple versions are around of the same resource, show which ones. (in other | |
| 1611 | words: show partition labels). | |
| 1612 | ||
| 1613 | * systemd-dissect: add --cat switch for dumping files such as /etc/os-release | |
| 1614 | ||
| 1615 | * per-service sandboxing option: ProtectIds=. If used, will overmount | |
| 1616 | /etc/machine-id and /proc/sys/kernel/random/boot_id with synthetic files, to | |
| 1617 | make it harder for the service to identify the host. Depending on the user | |
| 1618 | setting it should be fully randomized at invocation time, or a hash of the | |
| 1619 | real thing, keyed by the unit name or so. Of course, there are other ways to | |
| 1620 | get these IDs (e.g. journal) or similar ids (e.g. MAC addresses, DMI ids, CPU | |
| 1621 | ids), so this knob would only be useful in combination with other lockdown | |
| 1622 | options. Particularly useful for portable services, and anything else that | |
| 1623 | uses RootDirectory= or RootImage=. (Might also over-mount | |
| 1624 | /sys/class/dmi/id/*{uuid,serial} with /dev/null). | |
| 1625 | ||
| 1626 | * doc: prep a document explaining resolved's internal objects, i.e. Query | |
| 1627 | vs. Question vs. Transaction vs. Stream and so on. | |
| 1628 | ||
| 1629 | * doc: prep a document explaining PID 1's internal logic, i.e. transactions, | |
| 1630 | jobs, units | |
| 1631 | ||
| 1632 | * automatically ignore threaded cgroups in cg_xyz(). | |
| 1633 | ||
| 1634 | * add linker script that implicitly adds symbol for build ID and new coredump | |
| 1635 | json package metadata, and use that when logging | |
| 1636 | ||
| 1637 | * Enable RestrictFileSystems= for all our long-running services (similar: | |
| 1638 | RestrictNetworkInterfaces=) | |
| 1639 | ||
| 1640 | * Add systemd-analyze security checks for RestrictFileSystems= and | |
| 1641 | RestrictNetworkInterfaces= | |
| 1642 | ||
| 1643 | * cryptsetup/homed: implement TOTP authentication backed by TPM2 and its | |
| 1644 | internal clock. | |
| 1645 | ||
| 1646 | * man: rework os-release(5), and clearly separate our extension-release.d/ and | |
| 1647 | initrd-release parts, i.e. list explicitly which fields are about what. | |
| 1648 | ||
| 1649 | * sysext: before applying a sysext, do a superficial validation run so that | |
| 1650 | things are not rearranged to wildy. I.e. protect against accidental fuckups, | |
| 1651 | such as masking out /usr/lib/ or so. We should probably refuse if existing | |
| 1652 | inodes are replaced by other types of inodes or so. | |
| 1653 | ||
| 1654 | * userdb: when synthesizing NSS records, pick "best" password from defined | |
| 1655 | passwords, not just the first. i.e. if there are multiple defined, prefer | |
| 1656 | unlocked over locked and prefer non-empty over empty. | |
| 1657 | ||
| 1658 | * homed: if the homed shell fallback thing has access to an SSH agent, try to | |
| 1659 | use it to unlock home dir (if ssh-agent forwarding is enabled). We | |
| 1660 | could implement SSH unlocking of a homedir with that: when enrolling a new | |
| 1661 | ssh pubkey in a user record we'd ask the ssh-agent to sign some random value | |
| 1662 | with the privkey, then use that as luks key to unlock the home dir. Will not | |
| 1663 | work for ECDSA keys since their signatures contain a random component, but | |
| 1664 | will work for RSA and Ed25519 keys. | |
| 1665 | ||
| 1666 | * userdbd: implement an additional varlink service socket that provides the | |
| 1667 | host user db in restricted form, then allow this to be bind mounted into | |
| 1668 | sandboxed environments that want the host database in minimal form. All | |
| 1669 | records would be stripped of all meta info, except the basic UID/name | |
| 1670 | info. Then use this in portabled environments that do not use PrivateUsers=1. | |
| 1671 | ||
| 1672 | * portabled: when extracting unit files and copying to system.attached, if a | |
| 1673 | .p7s is available in the image, use it to protect the system.attached copy | |
| 1674 | with fs-verity, so that it cannot be tampered with | |
| 1675 | ||
| 1676 | * /etc/veritytab: allow that the roothash column can be specified as fs path | |
| 1677 | including a path to an AF_UNIX path, similar to how we do things with the | |
| 1678 | keys of /etc/crypttab. That way people can store/provide the roothash | |
| 1679 | externally and provide to us on demand only. | |
| 1680 | ||
| 1681 | * we probably should extend the root verity hash of the root fs into some PCR | |
| 1682 | on boot. (i.e. maybe add a veritytab option tpm2-measure=12 or so to measure | |
| 1683 | it into PCR 12); Similar: we probably should extend the LUKS volume key of | |
| 1684 | the root fs into some PCR on boot. (i.e. maybe add a crypttab option | |
| 1685 | tpm2-measure=15 or so to measure it into PCR 15); once both are in place | |
| 1686 | update gpt-auto-discovery to generate these by default for the partitions it | |
| 1687 | discovers. Static vendor stuff should probably end up in PCR 12 (i.e. the | |
| 1688 | verity hash), with local keys in PCR 15 (i.e. the encryption volume | |
| 1689 | key). That way, we nicely distinguish resources supplied by the OS vendor | |
| 1690 | (i.e. sysext, root verity) from those inherently local (i.e. encryption key), | |
| 1691 | which is useful if they shall be signed separately. | |
| 1692 | ||
| 1693 | * in uefi stub: query firmware regarding which PCR banks are being used, store | |
| 1694 | that in EFI var. then use this when enrolling TPM2 in cryptsetup to verify | |
| 1695 | that the selected PCRs actually are used by firmware. | |
| 1696 | ||
| 1697 | * rework recursive read-only remount to use new mount API | |
| 1698 | ||
| 1699 | * when mounting disk images: if IMAGE_ID/IMAGE_VERSION is set in os-release | |
| 1700 | data in the image, make sure the image filename actually matches this, so | |
| 1701 | that images cannot be misused. | |
| 1702 | ||
| 1703 | * sysupdate: | |
| 1704 | - add fuzzing to the pattern parser | |
| 1705 | - support casync as download mechanism | |
| 1706 | - "systemd-sysupdate update --all" support, that iterates through all components | |
| 1707 | defined on the host, plus all images installed into /var/lib/machines/, | |
| 1708 | /var/lib/portable/ and so on. | |
| 1709 | - Allow invocation with a single transfer definition, i.e. with | |
| 1710 | --definitions= pointing to a file rather than a dir. | |
| 1711 | - add ability to disable implicit decompression of downloaded artifacts, | |
| 1712 | i.e. a Compress=no option in the transfer definitions | |
| 1713 | ||
| 1714 | * in sd-id128: also parse UUIDs in RFC4122 URN syntax (i.e. chop off urn:uuid: prefix) | |
| 1715 | ||
| 1716 | * systemd-sysext: optionally, run it in initrd already, before transitioning | |
| 1717 | into host, to open up possibility for services shipped like that. | |
| 1718 | ||
| 1719 | * whenever we receive fds via SCM_RIGHTS make sure none got dropped due to the | |
| 1720 | reception limit the kernel silently enforces. | |
| 1721 | ||
| 1722 | * Add service unit setting ConnectStream= which takes IP addresses and connects to them. | |
| 1723 | ||
| 1724 | * Similar, Load= which takes literal data in text or base64 format, and puts it | |
| 1725 | into a memfd, and passes that. This enables some fun stuff, such as embedding | |
| 1726 | bash scripts in unit files, by combining Load= with ExecStart=/bin/bash | |
| 1727 | /proc/self/fd/3 | |
| 1728 | ||
| 1729 | * add a ConnectSocket= setting to service unit files, that may reference a | |
| 1730 | socket unit, and which will connect to the socket defined therein, and pass | |
| 1731 | the resulting fd to the service program via socket activation proto. | |
| 1732 | ||
| 1733 | * Add a concept of ListenStream=anonymous to socket units: listen on a socket | |
| 1734 | that is deleted in the fs. Use case would be with ConnectSocket= above. | |
| 1735 | ||
| 1736 | * importd: support image signature verification with PKCS#7 + OpenBSD signify | |
| 1737 | logic, as alternative to crummy gpg | |
| 1738 | ||
| 1739 | * add "systemd-analyze debug" + AttachDebugger= in unit files: The former | |
| 1740 | specifies a command to execute; the latter specifies that an already running | |
| 1741 | "systemd-analyze debug" instance shall be contacted and execution paused | |
| 1742 | until it gives an OK. That way, tools like gdb or strace can be safely be | |
| 1743 | invoked on processes forked off PID 1. | |
| 1744 | ||
| 1745 | * expose MS_NOSYMFOLLOW in various places | |
| 1746 | ||
| 1747 | * credentials system: | |
| 1748 | - acquire from EFI variable? | |
| 1749 | - acquire via ask-password? | |
| 1750 | - acquire creds via keyring? | |
| 1751 | - pass creds via keyring? | |
| 1752 | - pass creds via memfd? | |
| 1753 | - acquire + decrypt creds from pkcs11? | |
| 1754 | - make macsec code in networkd read key via creds logic (copy logic from | |
| 1755 | wireguard) | |
| 1756 | - make gatewayd/remote read key via creds logic | |
| 1757 | - add sd_notify() command for flushing out creds not needed anymore | |
| 1758 | ||
| 1759 | * TPM2: auto-reenroll in cryptsetup, as fallback for hosed firmware upgrades | |
| 1760 | and such | |
| 1761 | ||
| 1762 | * introduce a new group to own TPM devices | |
| 1763 | ||
| 1764 | * cryptsetup: add option for automatically removing empty password slot on boot | |
| 1765 | ||
| 1766 | * cryptsetup: optionally, when run during boot-up and password is never | |
| 1767 | entered, and we are on battery power (or so), power off machine again | |
| 1768 | ||
| 1769 | * cryptsetup: when waiting for FIDO2/PKCS#11 token, tell plymouth that, and | |
| 1770 | allow plymouth to abort the waiting and enter pw instead | |
| 1771 | ||
| 1772 | * make cryptsetup lower --iter-time | |
| 1773 | ||
| 1774 | * cryptsetup: allow encoding key directly in /etc/crypttab, maybe with a | |
| 1775 | "base64:" prefix. Useful in particular for pkcs11 mode. | |
| 1776 | ||
| 1777 | * cryptsetup: reimplement the mkswap/mke2fs in cryptsetup-generator to use | |
| 1778 | systemd-makefs.service instead. | |
| 1779 | ||
| 1780 | * cryptsetup: | |
| 1781 | - cryptsetup-generator: allow specification of passwords in crypttab itself | |
| 1782 | - support rd.luks.allow-discards= kernel cmdline params in cryptsetup generator | |
| 1783 | ||
| 1784 | * systemd-analyze netif that explains predictable interface (or networkctl) | |
| 1785 | ||
| 1786 | * systemd-analyze inspect-elf should show other notes too, at least build-id. | |
| 1787 | ||
| 1788 | * Figure out naming of verbs in systemd-analyze: we have (singular) capability, | |
| 1789 | exit-status, but (plural) filesystems, architectures. | |
| 1790 | ||
| 1791 | * Add service setting to run a service within the specified VRF. i.e. do the | |
| 1792 | equivalent of "ip vrf exec". | |
| 1793 | ||
| 1794 | * special case some calls of chase() to use openat2() internally, so | |
| 1795 | that the kernel does what we otherwise do. | |
| 1796 | ||
| 1797 | * add a new flag to chase() that stops chasing once the first missing | |
| 1798 | component is found and then allows the caller to create the rest. | |
| 1799 | ||
| 1800 | * make use of new glibc 2.32 APIs sigabbrev_np(). | |
| 1801 | ||
| 1802 | * if /usr/bin/swapoff fails due to OOM, log a friendly explanatory message about it | |
| 1803 | ||
| 1804 | * pid1: also remove PID files of a service when the service starts, not just | |
| 1805 | when it exits | |
| 1806 | ||
| 1807 | * seccomp: maybe use seccomp_merge() to merge our filters per-arch if we can. | |
| 1808 | Apparently kernel performance is much better with fewer larger seccomp | |
| 1809 | filters than with more smaller seccomp filters. | |
| 1810 | ||
| 1811 | * systemd-path: Add "private" runtime/state/cache dir enum, mapping to | |
| 1812 | $RUNTIME_DIRECTORY, $STATE_DIRECTORY and such | |
| 1813 | ||
| 1814 | * seccomp: by default mask x32 ABI system wide on x86-64. it's on its way out | |
| 1815 | ||
| 1816 | * seccomp: don't install filters for ABIs that are masked anyway for the | |
| 1817 | specific service | |
| 1818 | ||
| 1819 | * busctl: maybe expose a verb "ping" for pinging a dbus service to see if it | |
| 1820 | exists and responds. | |
| 1821 | ||
| 1822 | * socket units: allow creating a udev monitor socket with ListenDevices= or so, | |
| 1823 | with matches, then activate app through that passing socket over | |
| 1824 | ||
| 1825 | * unify on openssl: | |
| 1826 | - figure out what to do about libmicrohttpd: | |
| 1827 | - 1.x is stable and has a hard dependency on gnutls | |
| 1828 | - 2.x is in development and has openssl support | |
| 1829 | - Worth testing against 2.x in our CI? | |
| 1830 | - port fsprg over to openssl | |
| 1831 | ||
| 1832 | * add growvol and makevol options for /etc/crypttab, similar to | |
| 1833 | x-systemd.growfs and x-systemd-makefs. | |
| 1834 | ||
| 1835 | * userdb: allow existence checks | |
| 1836 | ||
| 1837 | * pid1: activation by journal search expression | |
| 1838 | ||
| 1839 | * when switching root from initrd to host, set the machine_id env var so that | |
| 1840 | if the host has no machine ID set yet we continue to use the random one the | |
| 1841 | initrd had set. | |
| 1842 | ||
| 1843 | * sd-event: add native support for P_ALL waitid() watching, then move PID 1 to | |
| 1844 | it for reaping assigned but unknown children. This needs to some special care | |
| 1845 | to operate somewhat sensibly in light of priorities: P_ALL will return | |
| 1846 | arbitrary processes, regardless of the priority we want to watch them with, | |
| 1847 | hence on each event loop iteration check all processes which we shall watch | |
| 1848 | with higher prio explicitly, and then watch the entire rest with P_ALL. | |
| 1849 | ||
| 1850 | * tweak sd-event's child watching: keep a prioq of children to watch and use | |
| 1851 | waitid() only on the children with the highest priority until one is waitable | |
| 1852 | and ignore all lower-prio ones from that point on | |
| 1853 | ||
| 1854 | * maybe introduce xattrs that can be set on the root dir of the root fs | |
| 1855 | partition that declare the volatility mode to use the image in. Previously I | |
| 1856 | thought marking this via GPT partition flags but that's not ideal since | |
| 1857 | that's outside of the LUKS encryption/verity verification, and we probably | |
| 1858 | shouldn't operate in a volatile mode unless we got told so from a trusted | |
| 1859 | source. | |
| 1860 | ||
| 1861 | * coredump: maybe when coredumping read a new xattr from /proc/$PID/exe that | |
| 1862 | may be used to mark a whole binary as non-coredumpable. Would fix: | |
| 1863 | https://bugs.freedesktop.org/show_bug.cgi?id=69447 | |
| 1864 | ||
| 1865 | * teach parse_timestamp() timezones like the calendar spec already knows it | |
| 1866 | ||
| 1867 | * We should probably replace /etc/rc.d/README with a symlink to doc | |
| 1868 | content. After all it is constant vendor data. | |
| 1869 | ||
| 1870 | * maybe add kernel cmdline params: to force random seed crediting | |
| 1871 | ||
| 1872 | * let's not GC a unit while its ratelimits are still pending | |
| 1873 | ||
| 1874 | * when killing due to service watchdog timeout maybe detect whether target | |
| 1875 | process is under ptracing and then log loudly and continue instead. | |
| 1876 | ||
| 1877 | * make rfkill uaccess controllable by default, i.e. steal rule from | |
| 1878 | gnome-bluetooth and friends | |
| 1879 | ||
| 1880 | * make MAINPID= message reception checks even stricter: if service uses User=, | |
| 1881 | then check sending UID and ignore message if it doesn't match the user or | |
| 1882 | root. | |
| 1883 | ||
| 1884 | * maybe trigger a uevent "change" on a device if "systemctl reload xyz.device" | |
| 1885 | is issued. | |
| 1886 | ||
| 1887 | * when importing an fs tree with machined, optionally apply userns-rec-chown | |
| 1888 | ||
| 1889 | * when importing an fs tree with machined, complain if image is not an OS | |
| 1890 | ||
| 1891 | * Maybe introduce a helper safe_exec() or so, which is to execve() which | |
| 1892 | safe_fork() is to fork(). And then make revert the RLIMIT_NOFILE soft limit | |
| 1893 | to 1K implicitly, unless explicitly opted-out. | |
| 1894 | ||
| 1895 | * rework seccomp/nnp logic that even if User= is used in combination with | |
| 1896 | a seccomp option we don't have to set NNP. For that, change uid first while | |
| 1897 | keeping CAP_SYS_ADMIN, then apply seccomp, the drop cap. | |
| 1898 | ||
| 1899 | * when no locale is configured, default to UEFI's PlatformLang variable | |
| 1900 | ||
| 1901 | * add a new syscall group "@esoteric" for more esoteric stuff such as bpf() and | |
| 1902 | usefaultd() and make systemd-analyze check for it. | |
| 1903 | ||
| 1904 | * paranoia: whenever we process passwords, call mlock() on the memory | |
| 1905 | first. i.e. look for all places we use free_and_erasep() and | |
| 1906 | augment them with mlock(). Also use MADV_DONTDUMP. | |
| 1907 | Alternatively (preferably?) use memfd_secret(). | |
| 1908 | ||
| 1909 | * Move RestrictAddressFamily= to the new cgroup create socket | |
| 1910 | ||
| 1911 | * optionally: turn on cgroup delegation for per-session scope units | |
| 1912 | ||
| 1913 | * sd-boot: optionally, show boot menu when previous default boot item has | |
| 1914 | non-zero "tries done" count | |
| 1915 | ||
| 1916 | * augment CODE_FILE=, CODE_LINE= with something like CODE_BASE= or so which | |
| 1917 | contains some identifier for the project, which allows us to include | |
| 1918 | clickable links to source files generating these log messages. The identifier | |
| 1919 | could be some abberviated URL prefix or so (taking inspiration from Go | |
| 1920 | imports). For example, for systemd we could use | |
| 1921 | CODE_BASE=github.com/systemd/systemd/blob/98b0b1123cc or so which is | |
| 1922 | sufficient to build a link by prefixing "http://" and suffixing the | |
| 1923 | CODE_FILE. | |
| 1924 | ||
| 1925 | * Augment MESSAGE_ID with MESSAGE_BASE, in a similar fashion so that we can | |
| 1926 | make clickable links from log messages carrying a MESSAGE_ID, that lead to | |
| 1927 | some explanatory text online. | |
| 1928 | ||
| 1929 | * maybe extend .path units to expose fanotify() per-mount change events | |
| 1930 | ||
| 1931 | * hibernate/s2h: if swap is on weird storage and refuse if so | |
| 1932 | ||
| 1933 | * cgroups: use inotify to get notified when somebody else modifies cgroups | |
| 1934 | owned by us, then log a friendly warning. | |
| 1935 | ||
| 1936 | * beef up log.c with support for stripping ANSI sequences from strings, so that | |
| 1937 | it is OK to include them in log strings. This would be particularly useful so | |
| 1938 | that our log messages could contain clickable links for example for unit | |
| 1939 | files and suchlike we operate on. | |
| 1940 | ||
| 1941 | * add support for "portablectl attach http://foobar.com/waaa.raw (i.e. importd integration) | |
| 1942 | ||
| 1943 | * sync dynamic uids/gids between host+portable service (i.e. if DynamicUser=1 is set for a service, make sure that the | |
| 1944 | selected user is resolvable in the service even if it ships its own /etc/passwd) | |
| 1945 | ||
| 1946 | * Fix DECIMAL_STR_MAX or DECIMAL_STR_WIDTH. One includes a trailing NUL, the | |
| 1947 | other doesn't. What a disaster. Probably to exclude it. | |
| 1948 | ||
| 1949 | * Check that users of inotify's IN_DELETE_SELF flag are using it properly, as | |
| 1950 | usually IN_ATTRIB is the right way to watch deleted files, as the former only | |
| 1951 | fires when a file is actually removed from disk, i.e. the link count drops to | |
| 1952 | zero and is not open anymore, while the latter happens when a file is | |
| 1953 | unlinked from any dir. | |
| 1954 | ||
| 1955 | * systemctl, machinectl, loginctl: port "status" commands over to | |
| 1956 | format-table.c's vertical output logic. | |
| 1957 | ||
| 1958 | * pid1: lock image configured with RootDirectory=/RootImage= using the usual nspawn semantics while the unit is up | |
| 1959 | ||
| 1960 | * add --vacuum-xyz options to coredumpctl, matching those journalctl already has. | |
| 1961 | ||
| 1962 | * add CopyFile= or so as unit file setting that may be used to copy files or | |
| 1963 | directory trees from the host to the services RootImage= and RootDirectory= | |
| 1964 | environment. Which we can use for /etc/machine-id and in particular | |
| 1965 | /etc/resolv.conf. Should be smart and do something useful on read-only | |
| 1966 | images, for example fall back to read-only bind mounting the file instead. | |
| 1967 | ||
| 1968 | * bypass SIGTERM state in unit files if KillSignal is SIGKILL | |
| 1969 | ||
| 1970 | * add proper dbus APIs for the various sd_notify() commands, such as MAINPID=1 | |
| 1971 | and so on, which would mean we could report errors and such. | |
| 1972 | ||
| 1973 | * introduce DefaultSlice= or so in system.conf that allows changing where we | |
| 1974 | place our units by default, i.e. change system.slice to something | |
| 1975 | else. Similar, ManagerSlice= should exist so that PID1's own scope unit could | |
| 1976 | be moved somewhere else too. Finally machined and logind should get similar | |
| 1977 | options so that it is possible to move user session scopes and machines to a | |
| 1978 | different slice too by default. Use case: people who want to put resources on | |
| 1979 | the entire system, with the exception of one specific service. See: | |
| 1980 | https://lists.freedesktop.org/archives/systemd-devel/2018-February/040369.html | |
| 1981 | ||
| 1982 | * calenderspec: add support for week numbers and day numbers within a | |
| 1983 | year. This would allow us to define "bi-weekly" triggers safely. | |
| 1984 | ||
| 1985 | * sd-bus: add vtable flag, that may be used to request client creds implicitly | |
| 1986 | and asynchronously before dispatching the operation | |
| 1987 | ||
| 1988 | * sd-bus: parse addresses given in sd_bus_set_addresses immediately and not | |
| 1989 | only when used. Add unit tests. | |
| 1990 | ||
| 1991 | * make use of ethtool veth peer info in machined, for automatically finding out | |
| 1992 | host-side interface pointing to the container. | |
| 1993 | ||
| 1994 | * add some special mode to LogsDirectory=/StateDirectory=… that allows | |
| 1995 | declaring these directories without necessarily pulling in deps for them, or | |
| 1996 | creating them when starting up. That way, we could declare that | |
| 1997 | systemd-journald writes to /var/log/journal, which could be useful when we | |
| 1998 | doing disk usage calculations and so on. | |
| 1999 | ||
| 2000 | * deprecate RootDirectoryStartOnly= in favour of a new ExecStart= prefix char | |
| 2001 | ||
| 2002 | * support projid-based quota in machinectl for containers | |
| 2003 | ||
| 2004 | * add a way to lock down cgroup migration: a boolean, which when set for a unit | |
| 2005 | makes sure the processes in it can never migrate out of it | |
| 2006 | ||
| 2007 | * blog about fd store and restartable services | |
| 2008 | ||
| 2009 | * document Environment=SYSTEMD_LOG_LEVEL=debug drop-in in debugging document | |
| 2010 | ||
| 2011 | * rework ExecOutput and ExecInput enums so that EXEC_OUTPUT_NULL loses its | |
| 2012 | magic meaning and is no longer upgraded to something else if set explicitly. | |
| 2013 | ||
| 2014 | * in the long run: permit a system with /etc/machine-id linked to /dev/null, to | |
| 2015 | make it lose its identity, i.e. be anonymous. For this we'd have to patch | |
| 2016 | through the whole tree to make all code deal with the case where no machine | |
| 2017 | ID is available. | |
| 2018 | ||
| 2019 | * optionally, collect cgroup resource data, and store it in per-unit RRD files, | |
| 2020 | suitable for processing with rrdtool. Add bus API to access this data, and | |
| 2021 | possibly implement a CPULoad property based on it. | |
| 2022 | ||
| 2023 | * beef up pam_systemd to take unit file settings such as cgroups properties as | |
| 2024 | parameters | |
| 2025 | ||
| 2026 | * In DynamicUser= mode: before selecting a UID, use disk quota APIs on relevant | |
| 2027 | disks to see if the UID is already in use. | |
| 2028 | ||
| 2029 | * Add AddUser= setting to unit files, similar to DynamicUser=1 which however | |
| 2030 | creates a static, persistent user rather than a dynamic, transient user. We | |
| 2031 | can leverage code from sysusers.d for this. | |
| 2032 | ||
| 2033 | * add some optional flag to ReadWritePaths= and friends, that has the effect | |
| 2034 | that we create the dir in question when the service is started. Example: | |
| 2035 | ||
| 2036 | ReadWritePaths=:/var/lib/foobar | |
| 2037 | ||
| 2038 | * Add ExecMonitor= setting. May be used multiple times. Forks off a process in | |
| 2039 | the service cgroup, which is supposed to monitor the service, and when it | |
| 2040 | exits the service is considered failed by its monitor. | |
| 2041 | ||
| 2042 | * track the per-service PAM process properly (i.e. as an additional control | |
| 2043 | process), so that it may be queried on the bus and everything. | |
| 2044 | ||
| 2045 | * add a new "debug" job mode, that is propagated to unit_start() and for | |
| 2046 | services results in two things: we raise SIGSTOP right before invoking | |
| 2047 | execve() and turn off watchdog support. Then, use that to implement | |
| 2048 | "systemd-gdb" for attaching to the start-up of any system service in its | |
| 2049 | natural habitat. | |
| 2050 | ||
| 2051 | * add a percentage syntax for TimeoutStopSec=, e.g. TimeoutStopSec=150%, and | |
| 2052 | then use that for the setting used in user@.service. It should be understood | |
| 2053 | relative to the configured default value. | |
| 2054 | ||
| 2055 | * enable LockMLOCK to take a percentage value relative to physical memory | |
| 2056 | ||
| 2057 | * Permit masking specific netlink APIs with RestrictAddressFamily= | |
| 2058 | ||
| 2059 | * define gpt header bits to select volatility mode | |
| 2060 | ||
| 2061 | * ProtectClock= (drops CAP_SYS_TIMES, adds seecomp filters for settimeofday, adjtimex), sets DeviceAllow o /dev/rtc | |
| 2062 | ||
| 2063 | * ProtectTracing= (drops CAP_SYS_PTRACE, blocks ptrace syscall, makes /sys/kernel/tracing go away) | |
| 2064 | ||
| 2065 | * ProtectMount= (drop mount/umount/pivot_root from seccomp, disallow fuse via DeviceAllow, imply Mountflags=slave) | |
| 2066 | ||
| 2067 | * ProtectKeyRing= to take keyring calls away | |
| 2068 | ||
| 2069 | * RemoveKeyRing= to remove all keyring entries of the specified user | |
| 2070 | ||
| 2071 | * ProtectReboot= that masks reboot() and kexec_load() syscalls, prohibits kill | |
| 2072 | on PID 1 with the relevant signals, and makes relevant files in /sys and | |
| 2073 | /proc (such as the sysrq stuff) unavailable | |
| 2074 | ||
| 2075 | * Support ReadWritePaths/ReadOnlyPaths/InaccessiblePaths in systemd --user instances | |
| 2076 | via the new unprivileged Landlock LSM (https://landlock.io) | |
| 2077 | ||
| 2078 | * make sure the ratelimit object can deal with USEC_INFINITY as way to turn off things | |
| 2079 | ||
| 2080 | * in nss-systemd, if we run inside of RootDirectory= with PrivateUsers= set, | |
| 2081 | find a way to map the User=/Group= of the service to the right name. This way | |
| 2082 | a user/group for a service only has to exist on the host for the right | |
| 2083 | mapping to work. | |
| 2084 | ||
| 2085 | * add bus API for creating unit files in /etc, reusing the code for transient units | |
| 2086 | ||
| 2087 | * add bus API to remove unit files from /etc | |
| 2088 | ||
| 2089 | * add bus API to retrieve current unit file contents (i.e. implement "systemctl cat" on the bus only) | |
| 2090 | ||
| 2091 | * rework fopen_temporary() to make use of open_tmpfile_linkable() (problem: the | |
| 2092 | kernel doesn't support linkat() that replaces existing files, currently) | |
| 2093 | ||
| 2094 | * transient units: don't bother with actually setting unit properties, we | |
| 2095 | reload the unit file anyway | |
| 2096 | ||
| 2097 | * optionally, also require WATCHDOG=1 notifications during service start-up and shutdown | |
| 2098 | ||
| 2099 | * cache sd_event_now() result from before the first iteration... | |
| 2100 | ||
| 2101 | * PID1: find a way how we can reload unit file configuration for | |
| 2102 | specific units only, without reloading the whole of systemd | |
| 2103 | ||
| 2104 | * add an explicit parser for LimitRTPRIO= that verifies | |
| 2105 | the specified range and generates sane error messages for incorrect | |
| 2106 | specifications. | |
| 2107 | ||
| 2108 | * when we detect that there are waiting jobs but no running jobs, do something | |
| 2109 | ||
| 2110 | * PID 1 should send out sd_notify("WATCHDOG=1") messages (for usage in the --user mode, and when run via nspawn) | |
| 2111 | ||
| 2112 | * there's probably something wrong with having user mounts below /sys, | |
| 2113 | as we have for debugfs. for example, src/core/mount.c handles mounts | |
| 2114 | prefixed with /sys generally special. | |
| 2115 | https://lists.freedesktop.org/archives/systemd-devel/2015-June/032962.html | |
| 2116 | ||
| 2117 | * fstab-generator: default to tmpfs-as-root if only usr= is specified on the kernel cmdline | |
| 2118 | ||
| 2119 | * docs: bring https://systemd.io/MY_SERVICE_CANT_GET_REALTIME up to date | |
| 2120 | ||
| 2121 | * add a job mode that will fail if a transaction would mean stopping | |
| 2122 | running units. Use this in timedated to manage the NTP service | |
| 2123 | state. | |
| 2124 | https://lists.freedesktop.org/archives/systemd-devel/2015-April/030229.html | |
| 2125 | ||
| 2126 | * The udev blkid built-in should expose a property that reflects | |
| 2127 | whether media was sensed in USB CF/SD card readers. This should then | |
| 2128 | be used to control SYSTEMD_READY=1/0 so that USB card readers aren't | |
| 2129 | picked up by systemd unless they contain a medium. This would mirror | |
| 2130 | the behaviour we already have for CD drives. | |
| 2131 | ||
| 2132 | * hostnamectl: show root image uuid | |
| 2133 | ||
| 2134 | * Find a solution for SMACK capabilities stuff: | |
| 2135 | https://lists.freedesktop.org/archives/systemd-devel/2014-December/026188.html | |
| 2136 | ||
| 2137 | * synchronize console access with BSD locks: | |
| 2138 | https://lists.freedesktop.org/archives/systemd-devel/2014-October/024582.html | |
| 2139 | ||
| 2140 | * as soon as we have sender timestamps, revisit coalescing multiple parallel daemon reloads: | |
| 2141 | https://lists.freedesktop.org/archives/systemd-devel/2014-December/025862.html | |
| 2142 | ||
| 2143 | * figure out when we can use the coarse timers | |
| 2144 | ||
| 2145 | * maybe allow timer units with an empty Units= setting, so that they | |
| 2146 | can be used for resuming the system but nothing else. | |
| 2147 | ||
| 2148 | * what to do about udev db binary stability for apps? (raw access is not an option) | |
| 2149 | ||
| 2150 | * exponential backoff in timesyncd when we cannot reach a server | |
| 2151 | ||
| 2152 | * timesyncd: add ugly bus calls to set NTP servers per-interface, for usage by NM | |
| 2153 | ||
| 2154 | * add systemd.abort_on_kill or some other such flag to send SIGABRT instead of SIGKILL | |
| 2155 | (throughout the codebase, not only PID1) | |
| 2156 | ||
| 2157 | * drop nss-myhostname in favour of nss-resolve? | |
| 2158 | ||
| 2159 | * resolved: | |
| 2160 | - mDNS/DNS-SD | |
| 2161 | - service registration | |
| 2162 | - service/domain/types browsing | |
| 2163 | - avahi compat | |
| 2164 | - DNS-SD service registration from socket units | |
| 2165 | - resolved should optionally register additional per-interface LLMNR | |
| 2166 | names, so that for the container case we can establish the same name | |
| 2167 | (maybe "host") for referencing the server, everywhere. | |
| 2168 | - allow clients to request DNSSEC for a single lookup even if DNSSEC is off (?) | |
| 2169 | ||
| 2170 | * refcounting in sd-resolve is borked | |
| 2171 | ||
| 2172 | * add new gpt type for btrfs volumes | |
| 2173 | ||
| 2174 | * generator that automatically discovers btrfs subvolumes, identifies their purpose based on some xattr on them. | |
| 2175 | ||
| 2176 | * a way for container managers to turn off getty starting via $container_headless= or so... | |
| 2177 | ||
| 2178 | * figure out a nice way how we can let the admin know what child/sibling unit causes cgroup membership for a specific unit | |
| 2179 | ||
| 2180 | * For timer units: add some mechanisms so that timer units that trigger immediately on boot do not have the services | |
| 2181 | they run added to the initial transaction and thus confuse Type=idle. | |
| 2182 | ||
| 2183 | * add bus api to query unit file's X fields. | |
| 2184 | ||
| 2185 | * gpt-auto-generator: | |
| 2186 | - Make /home automount rather than mount? | |
| 2187 | ||
| 2188 | * add generator that pulls in systemd-network from containers when | |
| 2189 | CAP_NET_ADMIN is set, more than the loopback device is defined, even | |
| 2190 | when it is otherwise off | |
| 2191 | ||
| 2192 | * MessageQueueMessageSize= (and suchlike) should use parse_iec_size(). | |
| 2193 | ||
| 2194 | * implement Distribute= in socket units to allow running multiple | |
| 2195 | service instances processing the listening socket, and open this up | |
| 2196 | for ReusePort= | |
| 2197 | ||
| 2198 | * cgroups: | |
| 2199 | - implement per-slice CPUFairScheduling=1 switch | |
| 2200 | - introduce high-level settings for RT budget, swappiness | |
| 2201 | - how to reset dynamically changed unit cgroup attributes sanely? | |
| 2202 | - when reloading configuration, apply new cgroup configuration | |
| 2203 | - when recursively showing the cgroup hierarchy, optionally also show | |
| 2204 | the hierarchies of child processes | |
| 2205 | - add settings for cgroup.max.descendants and cgroup.max.depth, | |
| 2206 | maybe use them for user@.service | |
| 2207 | ||
| 2208 | * transient units: | |
| 2209 | - add field to transient units that indicate whether systemd or somebody else saves/restores its settings, for integration with libvirt | |
| 2210 | ||
| 2211 | * libsystemd-journal, libsystemd-login, libudev: add calls to easily attach these objects to sd-event event loops | |
| 2212 | ||
| 2213 | * be more careful what we export on the bus as (usec_t) 0 and (usec_t) -1 | |
| 2214 | ||
| 2215 | * rfkill,backlight: we probably should run the load tools inside of the udev rules so that the state is properly initialized by the time other software sees it | |
| 2216 | ||
| 2217 | * If we try to find a unit via a dangling symlink, generate a clean | |
| 2218 | error. Currently, we just ignore it and read the unit from the search | |
| 2219 | path anyway. | |
| 2220 | ||
| 2221 | * refuse boot if /usr/lib/os-release is missing or /etc/machine-id cannot be set up | |
| 2222 | ||
| 2223 | * man: the documentation of Restart= currently is very misleading and suggests the tools from ExecStartPre= might get restarted. | |
| 2224 | ||
| 2225 | * There's currently no way to cancel fsck (used to be possible via C-c or c on the console) | |
| 2226 | ||
| 2227 | * add option to sockets to avoid activation. Instead just drop packets/connections, see http://cyberelk.net/tim/2012/02/15/portreserve-systemd-solution/ | |
| 2228 | ||
| 2229 | * make sure systemd-ask-password-wall does not shutdown systemd-ask-password-console too early | |
| 2230 | ||
| 2231 | * verify that the AF_UNIX sockets of a service in the fs still exist | |
| 2232 | when we start a service in order to avoid confusion when a user | |
| 2233 | assumes starting a service is enough to make it accessible | |
| 2234 | ||
| 2235 | * Make it possible to set the keymap independently from the font on | |
| 2236 | the kernel cmdline. Right now setting one resets also the other. | |
| 2237 | ||
| 2238 | * and a dbus call to generate target from current state | |
| 2239 | ||
| 2240 | * investigate whether the gnome pty helper should be moved into systemd, to provide cgroup support. | |
| 2241 | ||
| 2242 | * dot output for --test showing the 'initial transaction' | |
| 2243 | ||
| 2244 | * be able to specify a forced restart of service A where service B depends on, in case B | |
| 2245 | needs to be auto-respawned? | |
| 2246 | ||
| 2247 | * pid1: | |
| 2248 | - When logging about multiple units (stopping BoundTo units, conflicts, etc.), | |
| 2249 | log both units as UNIT=, so that journalctl -u triggers on both. | |
| 2250 | - generate better errors when people try to set transient properties | |
| 2251 | that are not supported... | |
| 2252 | https://lists.freedesktop.org/archives/systemd-devel/2015-February/028076.html | |
| 2253 | - recreate systemd's D-Bus private socket file on SIGUSR2 | |
| 2254 | - when we automatically restart a service, ensure we restart its rdeps, too. | |
| 2255 | - hide PAM options in fragment parser when compile time disabled | |
| 2256 | - Support --test based on current system state | |
| 2257 | - If we show an error about a unit (such as not showing up) and it has no Description string, then show a description string generated form the reverse of unit_name_mangle(). | |
| 2258 | - after deserializing sockets in socket.c we should reapply sockopts and things | |
| 2259 | - drop PID 1 reloading, only do reexecing (difficult: Reload() | |
| 2260 | currently is properly synchronous, Reexec() is weird, because we | |
| 2261 | cannot delay the response properly until we are back, so instead of | |
| 2262 | being properly synchronous we just keep open the fd and close it | |
| 2263 | when done. That means clients do not get a successful method reply, | |
| 2264 | but much rather a disconnect on success. | |
| 2265 | - when breaking cycles drop sysv services first, then services from /run, then from /etc, then from /usr | |
| 2266 | - when a bus name of a service disappears from the bus make sure to queue further activation requests | |
| 2267 | - maybe introduce CoreScheduling=yes/no to optionally set a PR_SCHED_CORE cookie, so that all | |
| 2268 | processes in a service's cgroup share the same cookie and are guaranteed not to share SMT cores | |
| 2269 | with other units https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/core-scheduling.rst | |
| 2270 | - ExtensionImages= deduplication for services is currently only applied to disk images without GPT envelope. | |
| 2271 | This should be extended to work with proper DDIs too, as well as directory confext/sysext. Moreover, | |
| 2272 | system-wide confext/sysext should support this too. | |
| 2273 | - Pin the mount namespace via FD by sending it back from sd-exec to the manager, and use it | |
| 2274 | for live mounting, instead of doing it via PID | |
| 2275 | ||
| 2276 | * unit files: | |
| 2277 | - allow port=0 in .socket units | |
| 2278 | - maybe introduce ExecRestartPre= | |
| 2279 | - implement Register= switch in .socket units to enable registration | |
| 2280 | in Avahi, RPC and other socket registration services. | |
| 2281 | - allow Type=simple with PIDFile= | |
| 2282 | https://bugzilla.redhat.com/show_bug.cgi?id=723942 | |
| 2283 | - allow writing multiple conditions in unit files on one line | |
| 2284 | - introduce Type=pid-file | |
| 2285 | - add a concept of RemainAfterExit= to scope units | |
| 2286 | - Allow multiple ExecStart= for all Type= settings, so that we can cover rescue.service nicely | |
| 2287 | - add verification of [Install] section to systemd-analyze verify | |
| 2288 | ||
| 2289 | * timer units: | |
| 2290 | - timer units should get the ability to trigger when DST changes | |
| 2291 | - Modulate timer frequency based on battery state | |
| 2292 | ||
| 2293 | * add libsystemd-password or so to query passwords during boot using the password agent logic | |
| 2294 | ||
| 2295 | * clean up date formatting and parsing so that all absolute/relative timestamps we format can also be parsed | |
| 2296 | ||
| 2297 | * on shutdown: move utmp, wall, audit logic all into PID 1 (or logind?) | |
| 2298 | ||
| 2299 | * make repeated alt-ctrl-del presses printing a dump | |
| 2300 | ||
| 2301 | * currently x-systemd.timeout is lost in the initrd, since crypttab is copied into dracut, but fstab is not | |
| 2302 | ||
| 2303 | * add a pam module that on password changes updates any LUKS slot where the password matches | |
| 2304 | ||
| 2305 | * test/: | |
| 2306 | - add unit tests for config_parse_device_allow() | |
| 2307 | ||
| 2308 | * seems that when we follow symlinks to units we prefer the symlink | |
| 2309 | destination path over /etc and /usr. We should not do that. Instead | |
| 2310 | /etc should always override /run+/usr and also any symlink | |
| 2311 | destination. | |
| 2312 | ||
| 2313 | * when isolating, try to figure out a way how we implicitly can order | |
| 2314 | all units we stop before the isolating unit... | |
| 2315 | ||
| 2316 | * teach ConditionKernelCommandLine= globs or regexes (in order to match foobar={no,0,off}) | |
| 2317 | ||
| 2318 | * Add ConditionDirectoryNotEmpty= handle non-absoute paths as a search path or add | |
| 2319 | ConditionConfigSearchPathNotEmpty= or different syntax? See the discussion starting at | |
| 2320 | https://github.com/systemd/systemd/pull/15109#issuecomment-607740136. | |
| 2321 | ||
| 2322 | * BootLoaderSpec: Define a way how an installer can figure out whether a BLS | |
| 2323 | compliant boot loader is installed. | |
| 2324 | ||
| 2325 | * think about requeuing jobs when daemon-reload is issued? use case: | |
| 2326 | the initrd issues a reload after fstab from the host is accessible | |
| 2327 | and we might want to requeue the mounts local-fs acquired through | |
| 2328 | that automatically. | |
| 2329 | ||
| 2330 | * systemd-inhibit: make taking delay locks useful: support sending SIGINT or SIGTERM on PrepareForSleep() | |
| 2331 | ||
| 2332 | * remove any syslog support from log.c — we probably cannot do this before split-off udev is gone for good | |
| 2333 | ||
| 2334 | * shutdown logging: store to EFI var, and store to USB stick? | |
| 2335 | ||
| 2336 | * merge unit_kill_common() and unit_kill_context() | |
| 2337 | ||
| 2338 | * add a dependency on standard-conf.xml and other included files to man pages | |
| 2339 | ||
| 2340 | * MountFlags=shared acts as MountFlags=slave right now. | |
| 2341 | ||
| 2342 | * properly handle loop back mounts via fstab, especially regards to fsck/passno | |
| 2343 | ||
| 2344 | * initialize the hostname from the fs label of /, if /etc/hostname does not exist? | |
| 2345 | ||
| 2346 | * sd-bus: | |
| 2347 | - EBADSLT handling | |
| 2348 | - GetAllProperties() on a non-existing object does not result in a failure currently | |
| 2349 | - port to sd-resolve for connecting to TCP dbus servers | |
| 2350 | - see if we can introduce a new sd_bus_get_owner_machine_id() call to retrieve the machine ID of the machine of the bus itself | |
| 2351 | - see if we can drop more message validation on the sending side | |
| 2352 | - add API to clone sd_bus_message objects | |
| 2353 | - longer term: priority inheritance | |
| 2354 | - dbus spec updates: | |
| 2355 | - NameLost/NameAcquired obsolete | |
| 2356 | - path escaping | |
| 2357 | - update systemd.special(7) to mention that dbus.socket is only about the compatibility socket now | |
| 2358 | ||
| 2359 | * sd-event | |
| 2360 | - allow multiple signal handlers per signal? | |
| 2361 | - document chaining of signal handler for SIGCHLD and child handlers | |
| 2362 | - define more intervals where we will shift wakeup intervals around in, 1h, 6h, 24h, ... | |
| 2363 | - maybe support iouring as backend, so that we allow hooking read and write | |
| 2364 | operations instead of IO ready events into event loops. See considerations | |
| 2365 | here: | |
| 2366 | http://blog.vmsplice.net/2020/07/rethinking-event-loop-integration-for.html | |
| 2367 | ||
| 2368 | * dbus: when a unit failed to load (i.e. is in UNIT_ERROR state), we | |
| 2369 | should be able to safely try another attempt when the bus call LoadUnit() is invoked. | |
| 2370 | ||
| 2371 | * document org.freedesktop.MemoryAllocation1 | |
| 2372 | ||
| 2373 | * maybe do not install getty@tty1.service symlink in /etc but in /usr? | |
| 2374 | ||
| 2375 | * print a nicer explanation if people use variable/specifier expansion in ExecStart= for the first word | |
| 2376 | ||
| 2377 | * mount: turn dependency information from /proc/self/mountinfo into dependency information between systemd units. | |
| 2378 | ||
| 2379 | * EFI: | |
| 2380 | - honor language efi variables for default language selection (if there are any?) | |
| 2381 | - honor timezone efi variables for default timezone selection (if there are any?) | |
| 2382 | * bootctl | |
| 2383 | - recognize the case when not booted on EFI | |
| 2384 | ||
| 2385 | * bootctl: | |
| 2386 | - show whether UEFI audit mode is available | |
| 2387 | - teach it to prepare an ESP wholesale, i.e. with mkfs.vfat invocation | |
| 2388 | - teach it to copy in unified kernel images and maybe type #1 boot loader spec entries from host | |
| 2389 | ||
| 2390 | * logind: | |
| 2391 | - logind: optionally, ignore idle-hint logic for autosuspend, block suspend as long as a session is around | |
| 2392 | - logind: wakelock/opportunistic suspend support | |
| 2393 | - Add pretty name for seats in logind | |
| 2394 | - logind: allow showing logout dialog from system? | |
| 2395 | - add Suspend() bus calls which take timestamps to fix double suspend issues when somebody hits suspend and closes laptop quickly. | |
| 2396 | - if pam_systemd is invoked by su from a process that is outside of a | |
| 2397 | any session we should probably just become a NOP, since that's | |
| 2398 | usually not a real user session but just some system code that just | |
| 2399 | needs setuid(). | |
| 2400 | - logind: make the Suspend()/Hibernate() bus calls wait for the for | |
| 2401 | the job to be completed. before returning, so that clients can wait | |
| 2402 | for "systemctl suspend" to finish to know when the suspending is | |
| 2403 | complete. | |
| 2404 | - logind: when the power button is pressed short, just popup a | |
| 2405 | logout dialog. If it is pressed for 1s, do the usual | |
| 2406 | shutdown. Inspiration are Macs here. | |
| 2407 | - expose "Locked" property on logind session objects | |
| 2408 | - maybe allow configuration of the StopTimeout for session scopes | |
| 2409 | - rename session scope so that it includes the UID. THat way | |
| 2410 | the session scope can be arranged freely in slices and we don't have | |
| 2411 | make assumptions about their slice anymore. | |
| 2412 | - follow PropertiesChanged state more closely, to deal with quick logouts and | |
| 2413 | relogins | |
| 2414 | - (optionally?) spawn seat-manager@$SEAT.service whenever a seat shows up that as CanGraphical set | |
| 2415 | ||
| 2416 | * move multiseat vid/pid matches from logind udev rule to hwdb | |
| 2417 | ||
| 2418 | * delay activation of logind until somebody logs in, or when /dev/tty0 pulls it | |
| 2419 | in or lingering is on (so that containers don't bother with it until PAM is used). also exit-on-idle | |
| 2420 | ||
| 2421 | * journal: | |
| 2422 | - consider introducing implicit _TTY= + _PPID= + _EUID= + _EGID= + _FSUID= + _FSGID= fields | |
| 2423 | - journald: also get thread ID from client, plus thread name | |
| 2424 | - journal: when waiting for journal additions in the client always sleep at least 1s or so, in order to minimize wakeups | |
| 2425 | - add API to close/reopen/get fd for journal client fd in libsystemd-journal. | |
| 2426 | - fall back to /dev/log based logging in libsystemd-journal, if we cannot log natively? | |
| 2427 | - declare the local journal protocol stable in the wiki interface chart | |
| 2428 | - sd-journal: speed up sd_journal_get_data() with transparent hash table in bg | |
| 2429 | - journald: when dropping msgs due to ratelimit make sure to write | |
| 2430 | "dropped %u messages" not only when we are about to print the next | |
| 2431 | message that works, but already after a short timeout | |
| 2432 | - check if we can make journalctl by default use --follow mode inside of less if called without args? | |
| 2433 | - maybe add API to send pairs of iovecs via sd_journal_send | |
| 2434 | - journal: add a setgid "systemd-journal" utility to invoke from libsystemd-journal, which passes fds via STDOUT and does PK access | |
| 2435 | - journalctl: support negative filtering, i.e. FOOBAR!="waldo", | |
| 2436 | and !FOOBAR for events without FOOBAR. | |
| 2437 | - journal: store timestamp of journal_file_set_offline() in the header, | |
| 2438 | so it is possible to display when the file was last synced. | |
| 2439 | - journal-send.c, log.c: when the log socket is clogged, and we drop, count this and write a message about this when it gets unclogged again. | |
| 2440 | - journal: find a way to allow dropping history early, based on priority, other rules | |
| 2441 | - journal: When used on NFS, check payload hashes | |
| 2442 | - journald: add kernel cmdline option to disable ratelimiting for debug purposes | |
| 2443 | - refuse taking lower-case variable names in sd_journal_send() and friends. | |
| 2444 | - journald: we currently rotate only after MaxUse+MaxFilesize has been reached. | |
| 2445 | - journal: deal nicely with byte-by-byte copied files, especially regards header | |
| 2446 | - journal: sanely deal with entries which are larger than the individual file size, but where the components would fit | |
| 2447 | - Replace utmp, wtmp, btmp, and lastlog completely with journal | |
| 2448 | - journalctl: instead --after-cursor= maybe have a --cursor=XYZ+1 syntax? | |
| 2449 | - when a kernel driver logs in a tight loop, we should ratelimit that too. | |
| 2450 | - journald: optionally, log debug messages to /run but everything else to /var | |
| 2451 | - journald: when we drop syslog messages because the syslog socket is | |
| 2452 | full, make sure to write how many messages are lost as first thing | |
| 2453 | to syslog when it works again. | |
| 2454 | - journald: allow per-priority and per-service retention times when rotating/vacuuming | |
| 2455 | - journald: make use of uid-range.h to manage uid ranges to split | |
| 2456 | journals in. | |
| 2457 | - journalctl: add the ability to look for the most recent process of a binary. | |
| 2458 | journalctl /usr/bin/X11 --invocation=-1 | |
| 2459 | - systemctl: change 'status' to show logs for the last invocation, not a fixed | |
| 2460 | number of lines | |
| 2461 | - improve journalctl performance by loading journal files | |
| 2462 | lazily. Encode just enough information in the file name, so that we | |
| 2463 | do not have to open it to know that it is not interesting for us, for | |
| 2464 | the most common operations. | |
| 2465 | - man: document that corrupted journal files is nothing to act on | |
| 2466 | - rework journald sigbus stuff to use mutex | |
| 2467 | - Set RLIMIT_NPROC for systemd-journal-xyz, and all other of our | |
| 2468 | services that run under their own user ids, and use User= (but only | |
| 2469 | in a world where userns is ubiquitous since otherwise we cannot | |
| 2470 | invoke those daemons on the host AND in a container anymore). Also, | |
| 2471 | if LimitNPROC= is used without User= we should warn and refuse | |
| 2472 | operation. | |
| 2473 | - journalctl --verify: don't show files that are currently being | |
| 2474 | written to as FAIL, but instead show that they are being written to. | |
| 2475 | - add journalctl -H that talks via ssh to a remote peer and passes through | |
| 2476 | binary logs data | |
| 2477 | - add a version of --merge which also merges /var/log/journal/remote | |
| 2478 | - journalctl: -m should access container journals directly by enumerating | |
| 2479 | them via machined, and also watch containers coming and going. | |
| 2480 | Benefit: nspawn --ephemeral would start working nicely with the journal. | |
| 2481 | - assign MESSAGE_ID to log messages about failed services | |
| 2482 | - check if loop in decompress_blob_xz() is necessary | |
| 2483 | ||
| 2484 | * journald: support RFC3164 fully for the incoming syslog transport, see | |
| 2485 | https://github.com/systemd/systemd/issues/19251#issuecomment-816601955 | |
| 2486 | ||
| 2487 | * Hook up journald's FSS logic with TPM2: seal the verification disk by | |
| 2488 | time-based policy, so that the verification key can remain on host and ve | |
| 2489 | validated via TPM. | |
| 2490 | ||
| 2491 | * rework journalctl -M to be based on a machined method that generates a mount | |
| 2492 | fd of the relevant journal dirs in the container with uidmapping applied to | |
| 2493 | allow the host to read it, while making everything read-only. | |
| 2494 | ||
| 2495 | * journald: add varlink service that allows subscribing to certain log events, | |
| 2496 | for example matching by message ID, or log level returns a list of journal | |
| 2497 | cursors as they happen. | |
| 2498 | ||
| 2499 | * journald: also collect CLOCK_BOOTTIME timestamps per log entry. Then, derive | |
| 2500 | "corrected" CLOCK_REALTIME information on display from that and the timestamp | |
| 2501 | info of the newest entry of the specific boot (as identified by the boot | |
| 2502 | ID). This way, if a system comes up without a valid clock but acquires a | |
| 2503 | better clock later, we can "fix" older entry timestamps on display, by | |
| 2504 | calculating backwards. We cannot use CLOCK_MONOTONIC for this, since it does | |
| 2505 | not account for suspend phases. This would then also enable us to correct the | |
| 2506 | kmsg timestamping we consume (where we erroneously assume the clock was in | |
| 2507 | CLOCK_MONOTONIC, but it actually is CLOCK_BOOTTIME as per kernel). | |
| 2508 | ||
| 2509 | * in journald, write out a recognizable log record whenever the system clock is | |
| 2510 | changed ("stepped"), and in timesyncd whenever we acquire an NTP fix | |
| 2511 | ("slewing"). Then, in journalctl for each boot time we come across, find | |
| 2512 | these records, and use the structured info they include to display | |
| 2513 | "corrected" wallclock time, as calculated from the monotonic timestamp in the | |
| 2514 | log record, adjusted by the delta declared in the structured log record. | |
| 2515 | ||
| 2516 | * in journald: whenever we start a new journal file because the boot ID | |
| 2517 | changed, let's generate a recognizable log record containing info about old | |
| 2518 | and new ID. Then, when displaying log stream in journalctl look for these | |
| 2519 | records, to be able to order them. | |
| 2520 | ||
| 2521 | * journald: generate recognizable log events whenever we shutdown journald | |
| 2522 | cleanly, and when we migrate run → var. This way tools can verify that a | |
| 2523 | previous boot terminated cleanly, because either of these two messages must | |
| 2524 | be safely written to disk, then. | |
| 2525 | ||
| 2526 | * hook up journald with TPMs? measure new journal records to the TPM in regular | |
| 2527 | intervals, validate the journal against current TPM state with that. (taking | |
| 2528 | inspiration from IMA log) | |
| 2529 | ||
| 2530 | * sd-journal puts a limit on parallel journal files to view at once. journald | |
| 2531 | should probably honour that same limit (JOURNAL_FILES_MAX) when vacuuming to | |
| 2532 | ensure we never generate more files than we can actually view. | |
| 2533 | ||
| 2534 | * bsod: maybe use graphical mode. Use DRM APIs directly, see | |
| 2535 | https://github.com/dvdhrm/docs/blob/master/drm-howto/modeset.c for an example | |
| 2536 | for doing that. | |
| 2537 | ||
| 2538 | * maybe implicitly attach monotonic+realtime timestamps to outgoing messages in | |
| 2539 | log.c and sd-journal-send | |
| 2540 | ||
| 2541 | * journalctl/timesyncd: whenever timesyncd acquires a synchronization from NTP, | |
| 2542 | create a structured log entry that contains boot ID, monotonic clock and | |
| 2543 | realtime clock (I mean, this requires no special work, as these three fields | |
| 2544 | are implicit). Then in journalctl when attempting to display the realtime | |
| 2545 | timestamp of a log entry, first search for the closest later log entry | |
| 2546 | of this kinda that has a matching boot id, and convert the monotonic clock | |
| 2547 | timestamp of the entry to the realtime clock using this info. This way we can | |
| 2548 | retroactively correct the wallclock timestamps, in particular for systems | |
| 2549 | without RTC, i.e. where initially wallclock timestamps carry rubbish, until | |
| 2550 | an NTP sync is acquired. | |
| 2551 | ||
| 2552 | * introduce per-unit (i.e. per-slice, per-service) journal log size limits. | |
| 2553 | ||
| 2554 | * journald: do journal file writing out-of-process, with one writer process per | |
| 2555 | client UID, so that synthetic hash table collisions can slow down a specific | |
| 2556 | user's journal stream down but not the others. | |
| 2557 | ||
| 2558 | * tweak journald context caching. In addition to caching per-process attributes | |
| 2559 | keyed by PID, cache per-cgroup attributes (i.e. the various xattrs we read) | |
| 2560 | keyed by cgroup path, and guarded by ctime changes. This should provide us | |
| 2561 | with a nice speed-up on services that have many processes running in the same | |
| 2562 | cgroup. | |
| 2563 | ||
| 2564 | * maybe add call sd_journal_set_block_timeout() or so to set SO_SNDTIMEO for | |
| 2565 | the sd-journal logging socket, and, if the timeout is set to 0, sets | |
| 2566 | O_NONBLOCK on it. That way people can control if and when to block for | |
| 2567 | logging. | |
| 2568 | ||
| 2569 | * journalctl: make sure -f ends when the container indicated by -M terminates | |
| 2570 | ||
| 2571 | * journald: sigbus API via a signal-handler safe function that people may call | |
| 2572 | from the SIGBUS handler | |
| 2573 | ||
| 2574 | * add a test if all entries in the catalog are properly formatted. | |
| 2575 | (Adding dashes in a catalog entry currently results in the catalog entry | |
| 2576 | being silently skipped. journalctl --update-catalog must warn about this, | |
| 2577 | and we should also have a unit test to check that all our message are OK.) | |
| 2578 | ||
| 2579 | * build short web pages out of each catalog entry, build them along with man | |
| 2580 | pages, and include hyperlinks to them in the journal output | |
| 2581 | ||
| 2582 | * homed: | |
| 2583 | - when user tries to log into record signed by unrecognized key, automatically add key to our chain after polkit auth | |
| 2584 | - rollback when resize fails mid-operation | |
| 2585 | - GNOME's side for forget key on suspend (requires rework so that lock screen runs outside of uid) | |
| 2586 | - update LUKS password on login if we find there's a password that unlocks the JSON record but not the LUKS device. | |
| 2587 | - create on activate? | |
| 2588 | - properties: icon url?, administrator bool (which translates to 'wheel' membership)?, address?, telephone?, vcard?, samba stuff?, parental controls? | |
| 2589 | - communicate clearly when usb stick is safe to remove. probably involves | |
| 2590 | beefing up logind to make pam session close hook synchronous and wait until | |
| 2591 | systemd --user is shut down. | |
| 2592 | - logind: maybe keep a "busy fd" as long as there's a non-released session around or the user@.service | |
| 2593 | - maybe make automatic, read-only, time-based reflink-copies of LUKS disk | |
| 2594 | images (and btrfs snapshots of subvolumes) (think: time machine) | |
| 2595 | - distinguish destroy / remove (i.e. currently we can unregister a user, unregister+remove their home directory, but not just remove their home directory) | |
| 2596 | - fingerprint authentication, pattern authentication, … | |
| 2597 | - make sure "classic" user records can also be managed by homed | |
| 2598 | - make size of $XDG_RUNTIME_DIR configurable in user record | |
| 2599 | - move acct mgmt stuff from pam_systemd_home to pam_systemd? | |
| 2600 | - when "homectl --pkcs11-token-uri=" is used, synthesize ssh-authorized-keys records for all keys we have private keys on the stick for | |
| 2601 | - make slice for users configurable (requires logind rework) | |
| 2602 | - logind: populate auto-login list bus property from PKCS#11 token | |
| 2603 | - when determining state of a LUKS home directory, check DM suspended sysfs file | |
| 2604 | - when homed is in use, maybe start the user session manager in a mount namespace with MS_SLAVE, | |
| 2605 | so that mounts propagate down but not up - eg, user A setting up a backup volume | |
| 2606 | doesn't mean user B sees it | |
| 2607 | - use credentials logic/TPM2 logic to store homed signing key | |
| 2608 | - permit multiple user record signing keys to be used locally, and pick | |
| 2609 | the right one for signing records automatically depending on a pre-existing | |
| 2610 | signature | |
| 2611 | - add a way to "take possession" of a home directory, i.e. strip foreign signatures | |
| 2612 | and insert a local signature instead. | |
| 2613 | - as an extension to the directory+subvolume backend: if located on | |
| 2614 | especially marked fs, then sync down password into LUKS header of that fs, | |
| 2615 | and always verify passwords against it too. Bootstrapping is a problem | |
| 2616 | though: if no one is logged in (or no other user even exists yet), how do you | |
| 2617 | unlock the volume in order to create the first user and add the first pw. | |
| 2618 | - support new FS_IOC_ADD_ENCRYPTION_KEY ioctl for setting up fscrypt | |
| 2619 | - maybe pre-create ~/.cache as subvol so that it can have separate quota | |
| 2620 | easily? | |
| 2621 | - store PKCS#11 + FIDO2 token info in LUKS2 header, compatible with | |
| 2622 | systemd-cryptsetup, so that it can unlock homed volumes | |
| 2623 | - maybe make all *.home files owned by `systemd-home` user or so, so that we | |
| 2624 | can easily set overall quota for all users | |
| 2625 | - on login, if we can't fallocate initially, but rebalance is on, then allow | |
| 2626 | login in discard mode, then immediately rebalance, then turn off discard | |
| 2627 | - add "homectl unbind" command to remove local user record of an inactive | |
| 2628 | home dir | |
| 2629 | ||
| 2630 | * add a new switch --auto-definitions=yes/no or so to systemd-repart. If | |
| 2631 | specified, synthesize a definition automatically if we can: enlarge last | |
| 2632 | partition on disk, but only if it is marked for growing and not read-only. | |
| 2633 | ||
| 2634 | * systemd-repart: read LUKS encryption key from $CREDENTIALS_DIRECTORY | |
| 2635 | ||
| 2636 | * systemd-repart: add a switch to factory reset the partition table without | |
| 2637 | immediately applying the new configuration again. i.e. --factory-reset=leave | |
| 2638 | or so. (this is useful to factory reset an image, then putting it into | |
| 2639 | another machine, ensuring that luks key is generated on new machine, not old) | |
| 2640 | ||
| 2641 | * systemd-repart: support setting up dm-integrity with HMAC | |
| 2642 | ||
| 2643 | * systemd-repart: maybe remove half-initialized image on failure. It fails | |
| 2644 | if the output file exists, so a repeated invocation will usually fail if | |
| 2645 | something goes wrong on the way. | |
| 2646 | ||
| 2647 | * systemd-repart: by default generate minimized partition tables (i.e. tables | |
| 2648 | that only cover the space actually used, excluding any free space at the | |
| 2649 | end), in order to maximize dd'ability. Requires libfdisk work, see | |
| 2650 | https://github.com/karelzak/util-linux/issues/907 | |
| 2651 | ||
| 2652 | * systemd-repart: MBR partition table support. Care needs to be taken regarding | |
| 2653 | Type=, so that partition definitions can sanely apply to both the GPT and the | |
| 2654 | MBR case. Idea: accept syntax "Type=gpt:home mbr:0x83" for setting the types | |
| 2655 | for the two partition types explicitly. And provide an internal mapping so | |
| 2656 | that "Type=linux-generic" maps to the right types for both partition tables | |
| 2657 | automatically. | |
| 2658 | ||
| 2659 | * systemd-repart: allow sizing partitions as factor of available RAM, so that | |
| 2660 | we can reasonably size swap partitions for hibernation. | |
| 2661 | ||
| 2662 | * systemd-repart: allow boolean option that ensures that if existing partition | |
| 2663 | doesn't exist within the configured size bounds the whole command fails. This | |
| 2664 | is useful to implement ESP vs. XBOOTLDR schemes in installers: have one set | |
| 2665 | of repart files for the case where ESP is large enough and one where it isn't | |
| 2666 | and XBOOTLDR is added in instead. Then apply the former first, and if it | |
| 2667 | fails to apply use the latter. | |
| 2668 | ||
| 2669 | * systemd-repart: add per-partition option to never reuse existing partition | |
| 2670 | and always create anew even if matching partition already exists. | |
| 2671 | ||
| 2672 | * systemd-repart: add per-partition option to fail if partition already exist, | |
| 2673 | i.e. is not added new. Similar, add option to fail if partition does not exist yet. | |
| 2674 | ||
| 2675 | * systemd-repart: allow disabling growing of specific partitions, or making | |
| 2676 | them (think ESP: we don't ever want to grow it, since we cannot resize vfat) | |
| 2677 | Also add option to disable operation via kernel command line. | |
| 2678 | ||
| 2679 | * systemd-repart: make it a static checker during early boot for existence and | |
| 2680 | absence of other partitions for trusted boot environments | |
| 2681 | ||
| 2682 | * systemd-repart: add support for SD_GPT_FLAG_GROWFS also on real systems, i.e. | |
| 2683 | generate some unit to actually enlarge the fs after growing the partition | |
| 2684 | during boot. | |
| 2685 | ||
| 2686 | * systemd-repart: do not print "Successfully resized …" when no change was done. | |
| 2687 | ||
| 2688 | * document: | |
| 2689 | - document that deps in [Unit] sections ignore Alias= fields in | |
| 2690 | [Install] units of other units, unless those units are disabled | |
| 2691 | - man: clarify that time-sync.target is not only sysv compat but also useful otherwise. Same for similar targets | |
| 2692 | - document that service reload may be implemented as service reexec | |
| 2693 | - add a man page containing packaging guidelines and recommending usage of things like Documentation=, PrivateTmp=, PrivateNetwork= and ReadOnlyDirectories=/etc /usr. | |
| 2694 | - document systemd-journal-flush.service properly | |
| 2695 | - documentation: recommend to connect the timer units of a service to the service via Also= in [Install] | |
| 2696 | - man: document the very specific env the shutdown drop-in tools live in | |
| 2697 | - man: add more examples to man pages, | |
| 2698 | - in particular an example how to do the equivalent of switching runlevels | |
| 2699 | - man: maybe sort directives in man pages, and take sections from --help and apply them to man too | |
| 2700 | - document root=gpt-auto properly | |
| 2701 | ||
| 2702 | * systemctl: | |
| 2703 | - add systemctl switch to dump transaction without executing it | |
| 2704 | - Add a verbose mode to "systemctl start" and friends that explains what is being done or not done | |
| 2705 | - print nice message from systemctl --failed if there are no entries shown, and hook that into ExecStartPre of rescue.service/emergency.service | |
| 2706 | - add new command to systemctl: "systemctl system-reexec" which reexecs as many daemons as virtually possible | |
| 2707 | - systemctl enable: fail if target to alias into does not exist? maybe show how many units are enabled afterwards? | |
| 2708 | - systemctl: "Journal has been rotated since unit was started." message is misleading | |
| 2709 | ||
| 2710 | * introduce an option (or replacement) for "systemctl show" that outputs all | |
| 2711 | properties as JSON, similar to busctl's new JSON output. In contrast to that | |
| 2712 | it should skip the variant type string though. | |
| 2713 | ||
| 2714 | * Add a "systemctl list-units --by-slice" mode or so, which rearranges the | |
| 2715 | output of "systemctl list-units" slightly by showing the tree structure of | |
| 2716 | the slices, and the units attached to them. | |
| 2717 | ||
| 2718 | * add "systemctl wait" or so, which does what "systemd-run --wait" does, but | |
| 2719 | for all units. It should be both a way to pin units into memory as well as a | |
| 2720 | wait to retrieve their exit data. | |
| 2721 | ||
| 2722 | * show whether a service has out-of-date configuration in "systemctl status" by | |
| 2723 | using mtime data of ConfigurationDirectory=. | |
| 2724 | ||
| 2725 | * "systemctl preset-all" should probably order the unit files it | |
| 2726 | operates on lexicographically before starting to work, in order to | |
| 2727 | ensure deterministic behaviour if two unit files conflict (like DMs | |
| 2728 | do, for example) | |
| 2729 | ||
| 2730 | * systemctl: if some operation fails, show log output? | |
| 2731 | ||
| 2732 | * Add a new verb "systemctl top" | |
| 2733 | ||
| 2734 | * unit install: | |
| 2735 | - "systemctl mask" should find all names by which a unit is accessible | |
| 2736 | (i.e. by scanning for symlinks to it) and link them all to /dev/null | |
| 2737 | ||
| 2738 | * nspawn: | |
| 2739 | - emulate /dev/kmsg using CUSE and turn off the syslog syscall | |
| 2740 | with seccomp. That should provide us with a useful log buffer that | |
| 2741 | systemd can log to during early boot, and disconnect container logs | |
| 2742 | from the kernel's logs. | |
| 2743 | - as soon as networkd has a bus interface, hook up --network-interface=, | |
| 2744 | --network-bridge= with networkd, to trigger netdev creation should an | |
| 2745 | interface be missing | |
| 2746 | - a nice way to boot up without machine id set, so that it is set at boot | |
| 2747 | automatically for supporting --ephemeral. Maybe hash the host machine id | |
| 2748 | together with the machine name to generate the machine id for the container | |
| 2749 | - fix logic always print a final newline on output. | |
| 2750 | https://github.com/systemd/systemd/pull/272#issuecomment-113153176 | |
| 2751 | - should optionally support receiving WATCHDOG=1 messages from its payload | |
| 2752 | PID 1... | |
| 2753 | - optionally automatically add FORWARD rules to iptables whenever nspawn is | |
| 2754 | running, remove them when shut down. | |
| 2755 | - add support for sysext extensions, too. i.e. a new --extension= switch that | |
| 2756 | takes one or more arguments, and applies the extensions already during | |
| 2757 | startup. | |
| 2758 | - when main nspawn supervisor process gets suspended due to SIGSTOP/SIGTTOU | |
| 2759 | or so, freeze the payload too. | |
| 2760 | - support time namespaces | |
| 2761 | - on cgroupsv1 issue cgroup empty handler process based on host events, so | |
| 2762 | that we make cgroup agent logic safe | |
| 2763 | - add API to invoke binary in container, then use that as fallback in | |
| 2764 | "machinectl shell" | |
| 2765 | - make nspawn suitable for shell pipelines: instead of triggering a hangup | |
| 2766 | when input is finished, send ^D, which synthesizes an EOF. Then wait for | |
| 2767 | hangup or ^D before passing on the EOF. | |
| 2768 | - greater control over selinux label? | |
| 2769 | - support that /proc, /sys/, /dev are pre-mounted | |
| 2770 | - maybe allow TPM passthrough, backed by swtpm, and measure --image= hash | |
| 2771 | into its PCR 11, so that nspawn instances can be TPM enabled, and partake | |
| 2772 | in measurements/remote attestation and such. swtpm would run outside of | |
| 2773 | control of container, and ideally would itself bind its encryption keys to | |
| 2774 | host TPM. | |
| 2775 | - make boot assessment do something sensible in a container. i.e send an | |
| 2776 | sd_notify() from payload to container manager once boot-up is completed | |
| 2777 | successfully, and use that in nspawn for dealing with boot counting, | |
| 2778 | implemented in the partition table labels and directory names. | |
| 2779 | - optionally set up nftables/iptables routes that forward UDP/TCP traffic on | |
| 2780 | port 53 to resolved stub 127.0.0.54 | |
| 2781 | - maybe optionally insert .nspawn file as GPT partition into images, so that | |
| 2782 | such container images are entirely stand-alone and can be updated as one. | |
| 2783 | - The subreaper logic we currently have seems overly complex. We should | |
| 2784 | investigate whether creating the inner child with CLONE_PARENT isn't better. | |
| 2785 | - Reduce the number of sockets that are currently in use and just rely on one | |
| 2786 | or two sockets. | |
| 2787 | ||
| 2788 | * machined: | |
| 2789 | - add an API so that libvirt-lxc can inform us about network interfaces being | |
| 2790 | removed or added to an existing machine | |
| 2791 | - "machinectl migrate" or similar to copy a container from or to a | |
| 2792 | difference host, via ssh | |
| 2793 | - introduce systemd-nspawn-ephemeral@.service, and hook it into | |
| 2794 | "machinectl start" with a new --ephemeral switch | |
| 2795 | - "machinectl status" should also show internal logs of the container in | |
| 2796 | question | |
| 2797 | - "machinectl history" | |
| 2798 | - "machinectl diff" | |
| 2799 | - "machinectl commit" that takes a writable snapshot of a tree, invokes a | |
| 2800 | shell in it, and marks it read-only after use | |
| 2801 | ||
| 2802 | * udev: | |
| 2803 | - move to LGPL | |
| 2804 | - kill scsi_id | |
| 2805 | - add trigger --subsystem-match=usb/usb_device device | |
| 2806 | - reimport udev db after MOVE events for devices without dev_t | |
| 2807 | - re-enable ProtectClock= once only cgroupsv2 is supported. | |
| 2808 | See f562abe2963bad241d34e0b308e48cf114672c84. | |
| 2809 | ||
| 2810 | * coredump: | |
| 2811 | - save coredump in Windows/Mozilla minidump format | |
| 2812 | - when truncating coredumps, also log the full size that the process had, and make a metadata field so we can report truncated coredumps | |
| 2813 | - add examples for other distros in PACKAGE_METADATA_FOR_EXECUTABLE_FILES | |
| 2814 | ||
| 2815 | * support crash reporting operation modes (https://live.gnome.org/GnomeOS/Design/Whiteboards/ProblemReporting) | |
| 2816 | ||
| 2817 | * tmpfiles: | |
| 2818 | - allow time-based cleanup in r and R too | |
| 2819 | - instead of ignoring unknown fields, reject them. | |
| 2820 | - creating new directories/subvolumes/fifos/device nodes | |
| 2821 | should not follow symlinks. None of the other adjustment or creation | |
| 2822 | calls follow symlinks. | |
| 2823 | - teach tmpfiles.d q/Q logic something sensible in the context of XFS/ext4 | |
| 2824 | project quota | |
| 2825 | - teach tmpfiles.d m/M to move / atomic move + symlink old -> new | |
| 2826 | - add new line type for setting btrfs subvolume attributes (i.e. rw/ro) | |
| 2827 | - tmpfiles: add new line type for setting fcaps | |
| 2828 | - add -n as shortcut for --dry-run in tmpfiles & sysusers & possibly other places | |
| 2829 | ||
| 2830 | * udev-link-config: | |
| 2831 | - Make sure ID_PATH is always exported and complete for | |
| 2832 | network devices where possible, so we can safely rely | |
| 2833 | on Path= matching | |
| 2834 | ||
| 2835 | * sd-rtnl: | |
| 2836 | - add support for more attribute types | |
| 2837 | - inbuilt piping support (essentially degenerate async)? see loopback-setup.c and other places | |
| 2838 | ||
| 2839 | * networkd: | |
| 2840 | - add more keys to [Route] and [Address] sections | |
| 2841 | - add support for more DHCPv4 options (and, longer term, other kinds of dynamic config) | |
| 2842 | - add reduced [Link] support to .network files | |
| 2843 | - properly handle routerless dhcp leases | |
| 2844 | - work with non-Ethernet devices | |
| 2845 | - dhcp: do we allow configuring dhcp routes on interfaces that are not the one we got the dhcp info from? | |
| 2846 | - the DHCP lease data (such as NTP/DNS) is still made available when | |
| 2847 | a carrier is lost on a link. It should be removed instantly. | |
| 2848 | - expose in the API the following bits: | |
| 2849 | - option 15, domain name | |
| 2850 | - option 12, hostname and/or option 81, fqdn | |
| 2851 | - option 123, 144, geolocation | |
| 2852 | - option 252, configure http proxy (PAC/wpad) | |
| 2853 | - provide a way to define a per-network interface default metric value | |
| 2854 | for all routes to it. possibly a second default for DHCP routes. | |
| 2855 | - allow Name= to be specified repeatedly in the [Match] section. Maybe also | |
| 2856 | support Name=foo*|bar*|baz ? | |
| 2857 | - whenever uplink info changes, make DHCP server send out FORCERENEW | |
| 2858 | ||
| 2859 | * in networkd, when matching device types, fix up DEVTYPE rubbish the kernel passes to us | |
| 2860 | ||
| 2861 | * Figure out how to do unittests of networkd's state serialization | |
| 2862 | ||
| 2863 | * dhcp: | |
| 2864 | - figure out how much we can increase Maximum Message Size | |
| 2865 | ||
| 2866 | * dhcp6: | |
| 2867 | - add functions to set previously stored IPv6 addresses on startup and get | |
| 2868 | them at shutdown; store them in client->ia_na | |
| 2869 | - write more test cases | |
| 2870 | - implement reconfigure support, see 5.3., 15.11. and 22.20. | |
| 2871 | - implement support for temporary addresses (IA_TA) | |
| 2872 | - implement dhcpv6 authentication | |
| 2873 | - investigate the usefulness of Confirm messages; i.e. are there any | |
| 2874 | situations where the link changes without any loss in carrier detection | |
| 2875 | or interface down | |
| 2876 | - some servers don't do rapid commit without a filled in IA_NA, verify | |
| 2877 | this behavior | |
| 2878 | - RouteTable= ? | |
| 2879 | ||
| 2880 | * shared/wall: Once more programs are taught to prefer sd-login over utmp, | |
| 2881 | switch the default wall implementation to wall_logind | |
| 2882 | (https://github.com/systemd/systemd/pull/29051#issuecomment-1704917074) | |
| 2883 | ||
| 2884 | * Hook up systemd-journal-upload with RESTART_RESET=1 logic (should probably | |
| 2885 | be conditioned on the num of successfully uploaded entries?) |