]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
7 years agotest-selinux: place %m after %[sf] (#4977)
Evgeny Vereshchagin [Sun, 25 Dec 2016 11:17:22 +0000 (14:17 +0300)] 
test-selinux: place %m after %[sf] (#4977)

"%d (%m) %s\n" crashes asan: https://github.com/google/sanitizers/issues/759
So, let's place %m after %s

Fixes:
```
$ ./libtool --mode=execute ./test-selinux
...
============ test_misc ==========
ASAN:DEADLYSIGNAL
=================================================================
==2981==ERROR: AddressSanitizer: SEGV on unknown address 0x000041b58ab3 (pc 0x7fd9c55a0eb2 bp 0x7fffdc2f9640 sp 0x7fffdc2f8d68 T0)
    #0 0x7fd9c55a0eb1  (/lib64/libasan.so.3+0xdeeb1)
    #1 0x7fd9c5550bbf  (/lib64/libasan.so.3+0x8ebbf)
    #2 0x7fd9c5552cdd in __interceptor_vsnprintf (/lib64/libasan.so.3+0x90cdd)
    #3 0x7fd9c5063715 in log_internalv src/basic/log.c:680
    #4 0x7fd9c506390a in log_internal src/basic/log.c:697
    #5 0x561d398181a2 in test_misc src/test/test-selinux.c:81
    #6 0x561d398185e8 in main src/test/test-selinux.c:117
    #7 0x7fd9c493a400 in __libc_start_main (/lib64/libc.so.6+0x20400)
    #8 0x561d39817859 in _start (/home/vagrant/systemd-asan/.libs/lt-test-selinux+0x1859)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib64/libasan.so.3+0xdeeb1)
==2981==ABORTING
```

7 years agomachinectl: handle EOPNOTSUPP from print_addresses (#4979)
Graeme Lawes [Sun, 25 Dec 2016 11:14:41 +0000 (06:14 -0500)] 
machinectl: handle EOPNOTSUPP from print_addresses (#4979)

Print addresses returns EOPNOTSUPP, not ENOSYS, when trying to print
addresses for non-container machines.

7 years agoman: minor improvements (#4981)
Lucas Werkmeister [Sun, 25 Dec 2016 11:14:00 +0000 (12:14 +0100)] 
man: minor improvements (#4981)

7 years agoman: Align ExecStop= documentation with actual kill behavior (#4974)
Felipe Sateler [Sat, 24 Dec 2016 10:34:26 +0000 (07:34 -0300)] 
man: Align ExecStop= documentation with actual kill behavior (#4974)

The manpage claimed that ExecStop would be followed immediately by
SIGKILL, whereas the actual behavior is to go through KillMode= and
KillSignal= first.

Fixes #4490

7 years agojournalctl: add remote log dir to search path when --merge is passed (#4970)
Marcin Bachry [Fri, 23 Dec 2016 23:42:13 +0000 (00:42 +0100)] 
journalctl: add remote log dir to search path when --merge is passed (#4970)

The journalctl man page says: "-m, --merge Show entries interleaved from all
available journals, including remote ones.", but current version of journalctl
doesn't live up to this promise. This patch simply adds
"/var/log/journal/remote" to search path if --merge flag is used.

Should fix issue #3618

7 years agoUpdated Debian config for mkosi (#4949)
AsciiWolf [Fri, 23 Dec 2016 20:56:01 +0000 (21:56 +0100)] 
Updated Debian config for mkosi (#4949)

7 years agonetworkd: Add example to create MACVTAP and attach it to a link (#4946)
Susant Sahani [Fri, 23 Dec 2016 17:09:29 +0000 (22:39 +0530)] 
networkd: Add example to create MACVTAP and attach it to a link (#4946)

Fixes: #4914
7 years agozsh-completion: fix typo and rephrase option hints (#4963)
Doug Christman [Fri, 23 Dec 2016 13:37:28 +0000 (08:37 -0500)] 
zsh-completion: fix typo and rephrase option hints (#4963)

7 years agoMerge pull request #4953 from esoleyman/master
Peter Hutterer [Thu, 22 Dec 2016 22:15:20 +0000 (08:15 +1000)] 
Merge pull request #4953 from esoleyman/master

Add Microsoft Surface Mouse DPI

7 years agonetworkd: Rename ProxyARP to IPv4ProxyARP (#4947)
Susant Sahani [Thu, 22 Dec 2016 09:23:29 +0000 (14:53 +0530)] 
networkd: Rename ProxyARP to IPv4ProxyARP (#4947)

Rename the arp proxy option to IPv4ProxyARP= in order to clarify
its relationship to IPv4, and map to the various IPv6 options we have.

Fixes: #4768
7 years agohwdb: clarify where to find the modalias and vid/pid information (#4952)
Peter Hutterer [Thu, 22 Dec 2016 09:20:02 +0000 (19:20 +1000)] 
hwdb: clarify where to find the modalias and vid/pid information (#4952)

Fixes #4938

7 years agoresolved: correctly handle non-address RR types with /etc/hosts lookups (#4808)
Martin Pitt [Thu, 22 Dec 2016 06:58:02 +0000 (07:58 +0100)] 
resolved: correctly handle non-address RR types with /etc/hosts lookups (#4808)

Fix wrong condition test in manager_etc_hosts_lookup(), which caused it to
return an IPv4 answer when an IPv6 question was asked, and vice versa.
Also only return success if we actually found any A or AAAA record.

In systemd-resolved.service(8), point out that /etc/hosts mappings only
affect address-type lookups, not other types.

The test case currently disables DNSSEC in resolved, as there is a bug
where "-t MX" fails due to "DNSSEC validation failed" even after
"downgrading to non-DNSSEC mode". This should be dropped once that bug
gets fixed.

Fixes #4801

7 years agoAdd Microsoft Surface Mouse DPI 4953/head
esoleyman [Thu, 22 Dec 2016 03:49:32 +0000 (21:49 -0600)] 
Add Microsoft Surface Mouse DPI

7 years agonetworkd: bond support primary slave and active slave (#4873)
Susant Sahani [Wed, 21 Dec 2016 18:10:36 +0000 (23:40 +0530)] 
networkd: bond support primary slave and active slave (#4873)

active_slave:

Specifies the new active slave for modes that support it
(active-backup, balance-alb and balance-tlb).

primary slave:
systemd-networks currently lacks the capability to set the primary slave
in an
active-backup bonding. This is necessary if you prefer one interface
over the
other. A common example is a eth0-wlan0 bonding on a laptop where you'd
want to
switch to the wired connection whenever it's available.

Fixes: #2837
7 years agonetworkd: vxlan rename ARPProxy to ReduceARPProxy (#4891)
Susant Sahani [Wed, 21 Dec 2016 17:59:15 +0000 (23:29 +0530)] 
networkd: vxlan rename ARPProxy to ReduceARPProxy (#4891)

Fixes: #4768
7 years agonspawn: unref the notify event source (#4941)
Evgeny Vereshchagin [Wed, 21 Dec 2016 17:36:15 +0000 (20:36 +0300)] 
nspawn: unref the notify event source (#4941)

Fixes:
```
sudo ./libtool --mode=execute valgrind --leak-check=full ./systemd-nspawn -D ./CONT/ -b
...
==21224== 2,444 (656 direct, 1,788 indirect) bytes in 1 blocks are definitely lost in loss record 13 of 15
==21224==    at 0x4C2FA50: calloc (vg_replace_malloc.c:711)
==21224==    by 0x4F6F565: sd_event_new (sd-event.c:431)
==21224==    by 0x1210BE: run (nspawn.c:3351)
==21224==    by 0x123908: main (nspawn.c:3826)
==21224==
==21224== LEAK SUMMARY:
==21224==    definitely lost: 656 bytes in 1 blocks
==21224==    indirectly lost: 1,788 bytes in 11 blocks
==21224==      possibly lost: 0 bytes in 0 blocks
==21224==    still reachable: 8,344 bytes in 3 blocks
==21224==         suppressed: 0 bytes in 0 blocks
```
Closes #4934

7 years agoMerge pull request #4935 from dobyrch/master
Lennart Poettering [Wed, 21 Dec 2016 10:18:02 +0000 (11:18 +0100)] 
Merge pull request #4935 from dobyrch/master

calendarspec: improve overflow handling

7 years agocalendarspec: minor refactoring and style fix 4935/head
Douglas Christman [Tue, 20 Dec 2016 21:44:01 +0000 (16:44 -0500)] 
calendarspec: minor refactoring and style fix

7 years agocalendarspec: improve overflow handling
Douglas Christman [Tue, 20 Dec 2016 21:42:12 +0000 (16:42 -0500)] 
calendarspec: improve overflow handling

Check if the parsed seconds value fits in an integer *after*
multiplying by USEC_PER_SEC, otherwise a large value can trigger
modulo by zero during normalization.

7 years agondisc: ignore invalid SLAAC prefix lengths (#4923)
Jörg Thalheim [Tue, 20 Dec 2016 19:27:06 +0000 (20:27 +0100)] 
ndisc: ignore invalid SLAAC prefix lengths (#4923)

- linux does not accept prefixes for SLAAC unequal to 64 bits: http://lxr.free-electrons.com/source/net/ipv6/addrconf.c#L2741
- when networkd tries export such a route to the kernel it will get -EINVAL and
  set the whole device into a failed state.
- this patch will make networkd ignore such prefixes for SLAAC,
  but process other informations which may contain other prefixes.
- Note that rfc4862 does not forbid prefix length != 64 bit

7 years agoman/journalctl: mention systemd-journal-remote(8) (#4929)
Baruch Siach [Tue, 20 Dec 2016 13:59:26 +0000 (15:59 +0200)] 
man/journalctl: mention systemd-journal-remote(8) (#4929)

Make it easier to figure out how to use the journalctl export format.

7 years agoMerge pull request #4904 from dobyrch/calendar-range-step
Lennart Poettering [Tue, 20 Dec 2016 10:14:59 +0000 (11:14 +0100)] 
Merge pull request #4904 from dobyrch/calendar-range-step

calendarspec: allow repetition values with ranges

7 years agosystemctl: do not segfault when we cannot find template unit (#4915)
Zbigniew Jędrzejewski-Szmek [Tue, 20 Dec 2016 10:09:59 +0000 (05:09 -0500)] 
systemctl: do not segfault when we cannot find template unit (#4915)

Core was generated by `systemctl cat test@.target test@.service'.
Program terminated with signal SIGSEGV, Segmentation fault.
32              movdqu  (%rdi), %xmm0
(gdb) bt
-0  strrchr () at ../sysdeps/x86_64/strrchr.S:32
-1  0x00007f57fdf837fe in __GI___basename (filename=0x0) at basename.c:24
-2  0x000055b8a77d0d91 in unit_find_paths (bus=0x55b8a9242f90, unit_name=0x55b8a92428f0 "test@.service", lp=0x7ffdc9070400, fragment_path=0x7ffdc90703e0, dropin_paths=0x7ffdc90703e8) at src/systemctl/systemctl.c:2584
-3  0x000055b8a77dbae5 in cat (argc=3, argv=0x7ffdc9070678, userdata=0x0) at src/systemctl/systemctl.c:5324
-4  0x00007f57fe55fc6b in dispatch_verb (argc=5, argv=0x7ffdc9070668, verbs=0x55b8a77f1c60 <verbs>, userdata=0x0) at src/basic/verbs.c:92
-5  0x000055b8a77e477f in systemctl_main (argc=5, argv=0x7ffdc9070668) at src/systemctl/systemctl.c:8141
-6  0x000055b8a77e5572 in main (argc=5, argv=0x7ffdc9070668) at src/systemctl/systemctl.c:8412

The right behaviour is not easy in this case. Implement some "sensible" logic.

Fixes #4912.

7 years agobuild-sys: revert dbus >= 1.9.18 requirement (#4924)
Mike Gilbert [Tue, 20 Dec 2016 09:53:53 +0000 (04:53 -0500)] 
build-sys: revert dbus >= 1.9.18 requirement (#4924)

Instead, document the necessary step to utilize older dbus versions.

7 years agoMerge pull request #4926 from whot/hwdb-updates
Martin Pitt [Tue, 20 Dec 2016 07:18:06 +0000 (08:18 +0100)] 
Merge pull request #4926 from whot/hwdb-updates

Hwdb updates

7 years agohwdb: axis override for HP Spectre 4926/head
Peter Hutterer [Thu, 8 Dec 2016 00:25:49 +0000 (10:25 +1000)] 
hwdb: axis override for HP Spectre

https://bugzilla.redhat.com/show_bug.cgi?id=1402596

7 years agohwdb: add axis overrides for Asus Vivobook E402SA
Peter Hutterer [Fri, 2 Dec 2016 03:44:09 +0000 (13:44 +1000)] 
hwdb: add axis overrides for Asus Vivobook E402SA

7 years agohwdb: add axis override for Lenovo W530
Peter Hutterer [Thu, 1 Dec 2016 00:38:08 +0000 (10:38 +1000)] 
hwdb: add axis override for Lenovo W530

https://bugs.freedesktop.org/show_bug.cgi?id=98844

7 years agohwdb: add axis override for Toshiba Tecra M11
Peter Hutterer [Wed, 30 Nov 2016 00:25:15 +0000 (10:25 +1000)] 
hwdb: add axis override for Toshiba Tecra M11

7 years agonetworkd-ndisc: handle missing mtu gracefully (#4913)
Jörg Thalheim [Mon, 19 Dec 2016 14:34:07 +0000 (15:34 +0100)] 
networkd-ndisc: handle missing mtu gracefully (#4913)

At least bird's implementation of router advertisement does not
set MTU option by default (instead it supplies an option to the user).
In this case just leave MTU as it is.

7 years agobuild-sys: treat format errors as fatal (#4910)
Zbigniew Jędrzejewski-Szmek [Sun, 18 Dec 2016 20:47:41 +0000 (15:47 -0500)] 
build-sys: treat format errors as fatal (#4910)

We currently don't expect any warnings about format strings, on any
architecture (#4612 removed the last few warnings). Turn those warnings into
errors in the future.

As requested by Martin Pitt.

gcc documentation says that -Wformat=2 includes -Wformat-security and
-Wformat-nonliteral so don't include them explicitly.

7 years agoMerge pull request #4892 from poettering/buspolicymove
Zbigniew Jędrzejewski-Szmek [Sun, 18 Dec 2016 16:43:18 +0000 (11:43 -0500)] 
Merge pull request #4892 from poettering/buspolicymove

build-sys: stop placing D-Bus policy below /etc

7 years agocore: downgrade "Time has been changed" to debug (#4906)
Zbigniew Jędrzejewski-Szmek [Sun, 18 Dec 2016 12:21:19 +0000 (07:21 -0500)] 
core: downgrade "Time has been changed" to debug (#4906)

That message is emitted by every systemd instance on every resume:
Dec 06 08:03:38 laptop systemd[1]: Time has been changed
Dec 06 08:03:38 laptop systemd[823]: Time has been changed
Dec 06 08:03:38 laptop systemd[916]: Time has been changed
Dec 07 08:00:32 laptop systemd[1]: Time has been changed
Dec 07 08:00:32 laptop systemd[823]: Time has been changed
Dec 07 08:00:32 laptop systemd[916]: Time has been changed
-- Reboot --
Dec 07 08:02:46 laptop systemd[836]: Time has been changed
Dec 07 08:02:46 laptop systemd[1]: Time has been changed
Dec 07 08:02:46 laptop systemd[926]: Time has been changed
Dec 07 19:48:12 laptop systemd[1]: Time has been changed
Dec 07 19:48:12 laptop systemd[836]: Time has been changed
Dec 07 19:48:12 laptop systemd[926]: Time has been changed
...

Fixes #4896.

7 years agoMerge pull request #4911 from keszybz/fixlets
Martin Pitt [Sun, 18 Dec 2016 12:20:12 +0000 (13:20 +0100)] 
Merge pull request #4911 from keszybz/fixlets

A few simple fixes / improvements

7 years agobasic/log: use IN_SET 4911/head
Zbigniew Jędrzejewski-Szmek [Sun, 18 Dec 2016 00:55:43 +0000 (19:55 -0500)] 
basic/log: use IN_SET

7 years agotest-compress: fix warning about LZ4_compress_limitedOutput
Zbigniew Jędrzejewski-Szmek [Sat, 17 Dec 2016 23:27:01 +0000 (18:27 -0500)] 
test-compress: fix warning about LZ4_compress_limitedOutput

691b90d465 fixed one spot, but missed the other one.

7 years agocore: remove spurious newline
Zbigniew Jędrzejewski-Szmek [Fri, 16 Dec 2016 21:08:51 +0000 (16:08 -0500)] 
core: remove spurious newline

7 years agodebug-generator: simplify handling of arg_default_unit
Zbigniew Jędrzejewski-Szmek [Fri, 16 Dec 2016 21:03:31 +0000 (16:03 -0500)] 
debug-generator: simplify handling of arg_default_unit

Also free the allocated memory before exiting.

7 years agoUse SPECIAL_DEFAULT_TARGET consistently
Zbigniew Jędrzejewski-Szmek [Fri, 16 Dec 2016 20:55:27 +0000 (15:55 -0500)] 
Use SPECIAL_DEFAULT_TARGET consistently

7 years agoModify mount_propagation_flags_from_string to return a normal int code
Zbigniew Jędrzejewski-Szmek [Sat, 3 Dec 2016 18:57:42 +0000 (13:57 -0500)] 
Modify mount_propagation_flags_from_string to return a normal int code

This means that callers can distiguish an error from flags==0,
and don't have to special-case the empty string.

7 years agoMerge pull request #4845 from poettering/various-smaller-fixes
Zbigniew Jędrzejewski-Szmek [Sat, 17 Dec 2016 18:36:00 +0000 (13:36 -0500)] 
Merge pull request #4845 from poettering/various-smaller-fixes

Various smaller fixes

7 years agocoredumpctl: let gdb handle the SIGINT signal (#4901)
Franck Bui [Sat, 17 Dec 2016 14:49:17 +0000 (15:49 +0100)] 
coredumpctl: let gdb handle the SIGINT signal (#4901)

Even if pressing Ctrl-c after spawning gdb with "coredumpctl gdb" is not really
useful, we should let gdb handle the signal entirely otherwise the user can be
suprised to see a different behavior when gdb is started by coredumpctl vs when
it's started directly.

Indeed in the former case, gdb exits due to coredumpctl being killed by the
signal.

So this patch makes coredumpctl ignore SIGINT as long as gdb is running.

7 years agoREADME: bump dbus dep 4892/head
Zbigniew Jędrzejewski-Szmek [Sat, 17 Dec 2016 14:26:40 +0000 (09:26 -0500)] 
README: bump dbus dep

We should also mention this in NEWS before release. Suggested text:
> DBus policy files are now installed into /usr rather than /etc. Make sure
> your system has dbus = 1.9.18 running before upgrading to this version, or
> override the install path with --with-dbuspolicydir=

7 years agocalendarspec: remove superfluous variables 4904/head
Douglas Christman [Fri, 16 Dec 2016 17:36:15 +0000 (12:36 -0500)] 
calendarspec: remove superfluous variables

7 years agocalendarspec: rename fields of CalendarComponent
Douglas Christman [Fri, 16 Dec 2016 20:49:54 +0000 (15:49 -0500)] 
calendarspec: rename fields of CalendarComponent

value/range_end -> start/stop

7 years agocalendarspec: allow repetition values with ranges
Douglas Christman [Fri, 16 Dec 2016 01:02:10 +0000 (20:02 -0500)] 
calendarspec: allow repetition values with ranges

"Every other hour from 9 until 5" can be written as
`9..17/2:00` instead of `9,11,13,15,17:00`

7 years agocore: make mount units from /proc/self/mountinfo possibly bind to a device (#4515)
Franck Bui [Fri, 16 Dec 2016 16:13:58 +0000 (17:13 +0100)] 
core: make mount units from /proc/self/mountinfo possibly bind to a device (#4515)

Since commit 9d06297, mount units from mountinfo are not bound to their devices
anymore (they use the "Requires" dependency instead).

This has the following drawback: if a media is mounted and the eject button is
pressed then the media is unconditionally ejected leaving some inconsistent
states.

Since udev is the component that is reacting (no matter if the device is used
or not) to the eject button, users expect that udev at least try to unmount the
media properly.

This patch introduces a new property "SYSTEMD_MOUNT_DEVICE_BOUND". When set on
a block device, all units that requires this device will see their "Requires"
dependency upgraded to a "BindTo" one. This is currently only used by cdrom
devices.

This patch also gives the possibility to the user to restore the previous
behavior that is bind a mount unit to a device. This is achieved by passing the
"x-systemd.device-bound" option to mount(8). Please note that currently this is
not working because libmount treats the x-* options has comments therefore
they're not available in utab for later application retrievals.

7 years agobootctl: fix typo (#4897)
Lucas Werkmeister [Fri, 16 Dec 2016 14:41:31 +0000 (15:41 +0100)] 
bootctl: fix typo (#4897)

7 years agocore: prevent invalid socket symlink target dereference (#4895)
Stefan Hajnoczi [Fri, 16 Dec 2016 10:20:27 +0000 (10:20 +0000)] 
core: prevent invalid socket symlink target dereference (#4895)

socket_find_symlink_target() returns a pointer to
p->address.sockaddr.un.sun_path when the first byte is non-zero without
checking that this is AF_UNIX socket.  Since sockaddr is a union this
byte could be non-zero for AF_INET sockets.

Existing callers happen to be safe but is an accident waiting to happen.
Use socket_address_get_path() since it checks for AF_UNIX.

7 years agorules: identify internal sound cards on platform bus (#4893)
Daniel Drake [Thu, 15 Dec 2016 22:11:11 +0000 (16:11 -0600)] 
rules: identify internal sound cards on platform bus (#4893)

We have a system which has the HDMI audio capability internally,
but pulseaudio is not giving it a very high priority compared
to e.g. USB sound cards.

The sound device appears on the platform bus and it is not
currently tagged with any form factor information.

It seems safe to assume that any sound card that is directly on the
platform bus is of internal form factor, but we must be careful because
udev rules will match all parent devices, not just the immediate parent,
and you will frequently encounter setups such as:

 Platform bus -> USB host controller -> USB sound card

In that case, SUBSYSTEMS==platform would match even though we're
clearly working with an external USB sound card.

In order to detect true platform devices here, we rely on the observation
that if any parent devices of the sound card are PCI, USB or firewire
devices, then this sound card cannot directly connected to the platform
bus. Otherwise, if we find a parent device on the platform bus, we assume
this is an internal sound card connected directly to the platform bus.

7 years agobuild-sys: stop placing D-Bus policy below /etc
Lennart Poettering [Mon, 12 Dec 2016 18:16:33 +0000 (19:16 +0100)] 
build-sys: stop placing D-Bus policy below /etc

Let's start placing our D-Bus policy files in /usr rather than /etc. D-Bus
supports this since 1.9.18, and moving our files over means we continue to work
even if /etc is flushed out entirely (for example if systemd-nspawn's
--volatile= switch is used).

Since 1.9.18 was released summer 2015 it should be fine to require a newer
version like this for our builds.

https://lists.freedesktop.org/archives/dbus/2015-July/016746.html

7 years agocalendarspec: free memory when parsing fails (#4890)
Doug Christman [Wed, 14 Dec 2016 18:21:27 +0000 (13:21 -0500)] 
calendarspec: free memory when parsing fails (#4890)

This prevents memory leaks on strings like `*~*-*`.

Fixes #4887

7 years agoupdate TODO 4845/head
Lennart Poettering [Tue, 6 Dec 2016 18:26:48 +0000 (19:26 +0100)] 
update TODO

7 years agomkosi: change /etc/issue text a bit for mkosi images build from systemd tree
Lennart Poettering [Tue, 6 Dec 2016 22:17:57 +0000 (23:17 +0100)] 
mkosi: change /etc/issue text a bit for mkosi images build from systemd tree

7 years agomkosi: run tests when building mkosi images
Lennart Poettering [Tue, 6 Dec 2016 22:17:30 +0000 (23:17 +0100)] 
mkosi: run tests when building mkosi images

7 years agobuild-sys: include the builddir in $PATH while testing
Lennart Poettering [Tue, 6 Dec 2016 21:55:43 +0000 (22:55 +0100)] 
build-sys: include the builddir in $PATH while testing

udev-test.pl shells out systemd-detect-virt, and it really should invoke the
version from the build tree instead of one supplied by the installed system,
hence let's add the builddir to $PATH while building.

7 years agoutil-lib: rework rename_process() to be able to make use of PR_SET_MM_ARG_START
Lennart Poettering [Tue, 6 Dec 2016 19:29:07 +0000 (20:29 +0100)] 
util-lib: rework rename_process() to be able to make use of PR_SET_MM_ARG_START

PR_SET_MM_ARG_START allows us to relatively cleanly implement process renaming.
However, it's only available with privileges. Hence, let's try to make use of
it, and if we can't fall back to the traditional way of overriding argv[0].

This removes size restrictions on the process name shown in argv[] at least for
privileged processes.

7 years agosysv-generator: properly translate sysv facilities
Lennart Poettering [Tue, 6 Dec 2016 18:36:30 +0000 (19:36 +0100)] 
sysv-generator: properly translate sysv facilities

We used the wrong return value in one case, so that our translations were
thrown away.

While we are at it, make sure to always initialize *ret on successful function
exits.

Fixes: #4762
7 years agomachinectl: make "machinectl -E … shell" work
Lennart Poettering [Tue, 6 Dec 2016 18:35:31 +0000 (19:35 +0100)] 
machinectl: make "machinectl -E … shell" work

Fixes: #4823
7 years agojournalctl: improve wording in an errors message
Lennart Poettering [Tue, 6 Dec 2016 18:34:18 +0000 (19:34 +0100)] 
journalctl: improve wording in an errors message

Fixes: #4660
7 years agoman: document that "systemctl show" shows low-level properties
Lennart Poettering [Tue, 6 Dec 2016 18:33:36 +0000 (19:33 +0100)] 
man: document that "systemctl show" shows low-level properties

Fixes: #4654
7 years agoman: minor fixes for sd_journal_print(3)
Lennart Poettering [Tue, 6 Dec 2016 18:27:17 +0000 (19:27 +0100)] 
man: minor fixes for sd_journal_print(3)

When sd_journal_perror() was added some footers weren't updated accordingly.
Let's do so.

Fixes: #4755
7 years agomkosi: update mkosi.fedora so that we can run "make check" during build
Lennart Poettering [Tue, 6 Dec 2016 17:41:27 +0000 (18:41 +0100)] 
mkosi: update mkosi.fedora so that we can run "make check" during build

Our tests require "diff" and "tree", hence let's add them to the set of
development packages.

7 years agonspawn: flush out environment block of the -a stub init process
Lennart Poettering [Tue, 6 Dec 2016 17:19:23 +0000 (18:19 +0100)] 
nspawn: flush out environment block of the -a stub init process

The container detection code in virt.c we ship checks for /proc/1/environ,
looking for "container=" in it. Let's make sure our "-a" init stub exposes that
correctly.

Without this "systemd-detect-virt" run in a "-a" container won't detect that it
is being run in a container.

7 years agoutil-lib: improve container detection logic
Lennart Poettering [Tue, 6 Dec 2016 14:51:26 +0000 (15:51 +0100)] 
util-lib: improve container detection logic

Previously, systemd-detect-virt was unable to detect "systemd-nspawn -a"
container environments, i.e. where PID 1 is a stub process running in host
context, as in that case /proc/1/environ was inherited from the host. Let's
improve that, and add an additional check for container environments where
/proc/1/environ is not cleaned up and does not contain the $container
environment variable:

The /proc/1/sched file shows the host PID in the first line. if this is not
1, we know we are running in a PID namespace (but not which implementation).

With these changes we should be able to detect container environments that
don't set $container at all.

7 years agoAdd sd_is_socket_sockaddr (#4885)
Zbigniew Jędrzejewski-Szmek [Wed, 14 Dec 2016 10:51:26 +0000 (05:51 -0500)] 
Add sd_is_socket_sockaddr (#4885)

Fixes #1188.

7 years agoMerge pull request #4889 from evverx/fix-test-fs-util-memleak
Ronny Chevalier [Wed, 14 Dec 2016 10:34:48 +0000 (11:34 +0100)] 
Merge pull request #4889 from evverx/fix-test-fs-util-memleak

test-fs-util: fix memleak

7 years agogenerator: order fsck service After= the device
Lennart Poettering [Wed, 7 Dec 2016 19:00:31 +0000 (20:00 +0100)] 
generator: order fsck service After= the device

Otherwise we might get started too early.

7 years agocore: rework logic to determine when we decide to add automatic deps for mounts
Lennart Poettering [Tue, 29 Nov 2016 21:50:21 +0000 (22:50 +0100)] 
core: rework logic to determine when we decide to add automatic deps for mounts

This adds a concept of "extrinsic" mounts. If mounts are extrinsic we consider
them managed by something else and do not add automatic ordering against
umount.target, local-fs.target, remote-fs.target.

Extrinsic mounts are considered:

- All mounts if we are running in --user mode

- API mounts such as everything below /proc, /sys, /dev, which exist from
  earliest boot to latest shutdown.

- All mounts marked as initrd mounts, if we run on the host

- The initrd's private directory /run/initrams that should survive until last
  reboot.

This primarily merges a couple of different exclusion lists into a single
concept.

7 years agocore: make sure targets that get a default Conflicts=shutdown.target are also ordered...
Lennart Poettering [Tue, 29 Nov 2016 20:07:05 +0000 (21:07 +0100)] 
core: make sure targets that get a default Conflicts=shutdown.target are also ordered against it

Let's tweak the automatic dependency generation of target units: not only add a
Conflicts= towards shutdown.target but also an After= line for it, so that we
can be sure the new target is not started when the old target is still up.

Discovered in the context of #4733

(Also, exclude dependency generation if for shutdown.target itself. — This is
strictly speaking redundant, as unit_add_two_dependencies_by_name() detects
that and becomes a NOP, but let's make this explicit for readability.)

7 years agoAdd a bit of documentation for the various undocumented environment variables we...
Lennart Poettering [Thu, 24 Nov 2016 16:47:39 +0000 (17:47 +0100)] 
Add a bit of documentation for the various undocumented environment variables we honour

7 years agoutil: Fine tune running_in_chroot() a bit
Lennart Poettering [Thu, 24 Nov 2016 16:42:19 +0000 (17:42 +0100)] 
util: Fine tune running_in_chroot() a bit

Let's be a bit more careful when detecting chroot() environments, so that we
can discern them from namespaced environments.

Previously this would simply check if the root directory of PID 1 matches our
own root directory. With this commit, we also check whether the namespaces of
PID 1 and ourselves are the same. If not we assume we are running inside of a
namespaced environment instead of a chroot() environment.

This has the benefit that systemctl (which uses running_in_chroot()) will work
as usual when invoked in a namespaced service.

7 years agoMerge pull request #4806 from poettering/keyring-init
Zbigniew Jędrzejewski-Szmek [Wed, 14 Dec 2016 04:24:42 +0000 (23:24 -0500)] 
Merge pull request #4806 from poettering/keyring-init

set up a per-service session kernel keyring, and store the invocation ID in it

7 years agoMerge pull request #4727 from poettering/exec-bind
Zbigniew Jędrzejewski-Szmek [Wed, 14 Dec 2016 03:30:07 +0000 (22:30 -0500)] 
Merge pull request #4727 from poettering/exec-bind

More namespace improvements

7 years agotest-fs-util: fix memleak 4889/head
Evgeny Vereshchagin [Wed, 14 Dec 2016 00:31:53 +0000 (00:31 +0000)] 
test-fs-util: fix memleak

Fixes:
```
$ ./libtool --mode=execute valgrind --leak-check=full ./test-fs-util
...
==22871==
==22871== 27 bytes in 1 blocks are definitely lost in loss record 1 of 1
==22871==    at 0x4C2FC47: realloc (vg_replace_malloc.c:785)
==22871==    by 0x4E86D05: strextend (string-util.c:726)
==22871==    by 0x4E8F347: chase_symlinks (fs-util.c:712)
==22871==    by 0x109EBF: test_chase_symlinks (test-fs-util.c:75)
==22871==    by 0x10C381: main (test-fs-util.c:305)
==22871==
```
Closes #4888

7 years agoupdate TODO 4727/head
Lennart Poettering [Thu, 24 Nov 2016 00:51:36 +0000 (01:51 +0100)] 
update TODO

7 years agocore: make "Restart" service property accessible via the transient API
Lennart Poettering [Wed, 23 Nov 2016 23:44:57 +0000 (00:44 +0100)] 
core: make "Restart" service property accessible via the transient API

Fixes: #4402
7 years agocore: add ability to define arbitrary bind mounts for services
Lennart Poettering [Wed, 23 Nov 2016 21:21:40 +0000 (22:21 +0100)] 
core: add ability to define arbitrary bind mounts for services

This adds two new settings BindPaths= and BindReadOnlyPaths=. They allow
defining arbitrary bind mounts specific to particular services. This is
particularly useful for services with RootDirectory= set as this permits making
specific bits of the host directory available to chrooted services.

The two new settings follow the concepts nspawn already possess in --bind= and
--bind-ro=, as well as the .nspawn settings Bind= and BindReadOnly= (and these
latter options should probably be renamed to BindPaths= and BindReadOnlyPaths=
too).

Fixes: #3439
7 years agonamespace: instead of chasing mount symlinks a priori, do so as-we-go
Lennart Poettering [Tue, 13 Dec 2016 23:51:37 +0000 (00:51 +0100)] 
namespace: instead of chasing mount symlinks a priori, do so as-we-go

This is relevant as many of the mounts we try to establish only can be followed
when some other prior mount that is a prefix of it is established. Hence: move
the symlink chasing into the actual mount functions, so that we do it as late
as possibly but as early as necessary.

Fixes: #4588
7 years agocore: rename BindMount structure → MountEntry
Lennart Poettering [Tue, 13 Dec 2016 23:48:52 +0000 (00:48 +0100)] 
core: rename BindMount structure → MountEntry

After all, these don#t strictly encapsulate bind mounts anymore, and we are
preparing this for adding arbitrary user-defined bind mounts in a later commit,
at which point this would become really confusing. Let's clean this up, rename
the BindMount structure to MountEntry, so that it is clear that it can contain
information about any kind of mount.

7 years agonamespace: add explicit read-only flag
Lennart Poettering [Wed, 23 Nov 2016 00:09:14 +0000 (01:09 +0100)] 
namespace: add explicit read-only flag

This reworks handling of the read-only management for mount points. This will
become handy as soon as we add arbitrary bind mount support (which comes in a
later commit).

7 years agonamespace: reindent protect_system_strict_table[] as well
Lennart Poettering [Tue, 22 Nov 2016 19:21:23 +0000 (20:21 +0100)] 
namespace: reindent protect_system_strict_table[] as well

All other tables got reindented, but one was forgotten. Fix that.

7 years agocore: hook up MountFlags= to the transient unit logic
Lennart Poettering [Tue, 22 Nov 2016 19:19:08 +0000 (20:19 +0100)] 
core: hook up MountFlags= to the transient unit logic

This makes "systemd-run -p MountFlags=shared -t /bin/sh" work, by making
MountFlags= to the list of properties that may be accessed transiently.

7 years agopam: include pam_keyinit.so in our PAM fragments 4806/head
Lennart Poettering [Wed, 7 Dec 2016 19:14:43 +0000 (20:14 +0100)] 
pam: include pam_keyinit.so in our PAM fragments

We want that systemd --user gets its own keyring as usual, even if the
barebones PAM snippet we ship upstream is used. If we don't do this we get the
basic keyring systemd --system sets up for us.

7 years agocore: store the invocation ID in the per-service keyring
Lennart Poettering [Fri, 2 Dec 2016 14:05:55 +0000 (15:05 +0100)] 
core: store the invocation ID in the per-service keyring

Let's store the invocation ID in the per-service keyring as a root-owned key,
with strict access rights. This has the advantage over the environment-based ID
passing that it also works from SUID binaries (as they key cannot be overidden
by unprivileged code starting them), in contrast to the secure_getenv() based
mode.

The invocation ID is now passed in three different ways to a service:

- As environment variable $INVOCATION_ID. This is easy to use, but may be
  overriden by unprivileged code (which might be a bad or a good thing), which
  means it's incompatible with SUID code (see above).

- As extended attribute on the service cgroup. This cannot be overriden by
  unprivileged code, and may be queried safely from "outside" of a service.
  However, it is incompatible with containers right now, as unprivileged
  containers generally cannot set xattrs on cgroupfs.

- As "invocation_id" key in the kernel keyring. This has the benefit that the
  key cannot be changed by unprivileged service code, and thus is safe to
  access from SUID code (see above). But do note that service code can replace
  the session keyring with a fresh one that lacks the key. However in that case
  the key will not be owned by root, which is easily detectable. The keyring is
  also incompatible with containers right now, as it is not properly namespace
  aware (but this is being worked on), and thus most container managers mask
  the keyring-related system calls.

Ideally we'd only have one way to pass the invocation ID, but the different
ways all have limitations. The invocation ID hookup in journald is currently
only available on the host but not in containers, due to the mentioned
limitations.

How to verify the new invocation ID in the keyring:

 # systemd-run -t /bin/sh
 Running as unit: run-rd917366c04f847b480d486017f7239d6.service
 Press ^] three times within 1s to disconnect TTY.
 # keyctl show
 Session Keyring
  680208392 --alswrv      0     0  keyring: _ses
  250926536 ----s-rv      0     0   \_ user: invocation_id
 # keyctl request user invocation_id
 250926536
 # keyctl read 250926536
 16 bytes of data in key:
 9c96317c ac64495a a42b9cd7 4f3ff96b
 # echo $INVOCATION_ID
 9c96317cac64495aa42b9cd74f3ff96b
 # ^D

This creates a new transient service runnint a shell. Then verifies the
contents of the keyring, requests the invocation ID key, and reads its payload.
For comparison the invocation ID as passed via the environment variable is also
displayed.

7 years agocore: run each system service with a fresh session keyring
Lennart Poettering [Fri, 2 Dec 2016 00:54:41 +0000 (01:54 +0100)] 
core: run each system service with a fresh session keyring

This patch ensures that each system service gets its own session kernel keyring
automatically, and implicitly. Without this a keyring is allocated for it
on-demand, but is then linked with the user's kernel keyring, which is OK
behaviour for logged in users, but not so much for system services.

With this change each service gets a session keyring that is specific to the
service and ceases to exist when the service is shut down. The session keyring
is not linked up with the user keyring and keys hence only search within the
session boundaries by default.

(This is useful in a later commit to store per-service material in the keyring,
for example the invocation ID)

(With input from David Howells)

7 years agoMerge pull request #4877 from evverx/fix-machine-id
Lennart Poettering [Tue, 13 Dec 2016 19:31:09 +0000 (20:31 +0100)] 
Merge pull request #4877 from evverx/fix-machine-id

handle corrupted /etc/machine-id nicer

7 years agotest: check that we can boot with broken machine-id 4877/head
Evgeny Vereshchagin [Tue, 13 Dec 2016 12:46:11 +0000 (12:46 +0000)] 
test: check that we can boot with broken machine-id

7 years agosd-id128: id128_write overwrites target file
Evgeny Vereshchagin [Tue, 13 Dec 2016 11:45:01 +0000 (11:45 +0000)] 
sd-id128: id128_write overwrites target file

7 years agomachine-id-setup: `--print --commit` respects the --root option
Evgeny Vereshchagin [Tue, 13 Dec 2016 11:34:09 +0000 (11:34 +0000)] 
machine-id-setup: `--print --commit` respects the --root option

7 years agocore: machine_id_setup overwrites broken machine-id
Evgeny Vereshchagin [Tue, 13 Dec 2016 10:36:03 +0000 (10:36 +0000)] 
core: machine_id_setup overwrites broken machine-id

7 years agonspawn: when getting SIGCHLD make sure it's from the first child (#4855)
Andrey Ulanov [Tue, 13 Dec 2016 01:38:18 +0000 (17:38 -0800)] 
nspawn: when getting SIGCHLD make sure it's from the first child (#4855)

When getting SIGCHLD we should not assume that it was the first
child forked from system-nspawn that has died as it may also be coming
from an orphan process. This change adds a signal handler that ignores
SIGCHLD unless it came from the first containerized child - the real
child.

Before this change the problem can be reproduced as follows:

$ sudo systemd-nspawn --directory=/container-root --share-system
Press ^] three times within 1s to kill container.
[root@andreyu-coreos ~]# { true & } &
[1] 22201
[root@andreyu-coreos ~]#
Container root-fedora-latest terminated by signal KILL

7 years agocatalog: update french translation following 5a1d6cb (#4872)
Sylvain Plantefève [Mon, 12 Dec 2016 21:17:51 +0000 (22:17 +0100)] 
catalog: update french translation following 5a1d6cb (#4872)

7 years agocatalog: update Polish translation (#4874)
Piotr Drąg [Mon, 12 Dec 2016 21:04:50 +0000 (22:04 +0100)] 
catalog: update Polish translation (#4874)

7 years agoMerge pull request #4771 from keszybz/udev-property-ordering
Martin Pitt [Mon, 12 Dec 2016 15:03:52 +0000 (16:03 +0100)] 
Merge pull request #4771 from keszybz/udev-property-ordering

Udev property ordering

7 years agoMerge pull request #4868 from keszybz/man
Martin Pitt [Mon, 12 Dec 2016 07:12:10 +0000 (08:12 +0100)] 
Merge pull request #4868 from keszybz/man

Ellipsization

7 years agoMerge pull request #4867 from keszybz/catalog-messages
Lennart Poettering [Sun, 11 Dec 2016 23:02:01 +0000 (00:02 +0100)] 
Merge pull request #4867 from keszybz/catalog-messages

Catalog message improvements

7 years agohwdb: emit warning when matches are specified at the very end of file 4771/head
Zbigniew Jędrzejewski-Szmek [Thu, 1 Dec 2016 16:46:40 +0000 (11:46 -0500)] 
hwdb: emit warning when matches are specified at the very end of file

This is also an error, but it wasn't caught.

[/tmp/tmp.YWeKax4fMI/etc/udev/hwdb.d/10-bad.hwdb:26] Property expected, ignoring record with no properties

7 years agoman: two trivial formatting fixes 4868/head
Zbigniew Jędrzejewski-Szmek [Sun, 11 Dec 2016 22:17:17 +0000 (17:17 -0500)] 
man: two trivial formatting fixes

7 years agoman: use unicode ellipsis in more places
Zbigniew Jędrzejewski-Szmek [Sun, 11 Dec 2016 22:01:07 +0000 (17:01 -0500)] 
man: use unicode ellipsis in more places

As requested in
https://github.com/systemd/systemd/pull/4864#pullrequestreview-12372557.

docbook will substitute triple dots for the ellipsis in man output, so this has
no effect on the troff output, only on HTML, making it infinitesimally nicer.

In some places we show output from programs, which use dots, and those places
should not be changed. In some tables, the alignment would change if dots were
changed to the ellipsis which is only one character. Since docbook replaces the
ellipsis automatically, we should leave those be. This patch changes all other
places.