]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
9 years agoMerge pull request #500 from zonque/fileio
Lennart Poettering [Wed, 8 Jul 2015 20:13:53 +0000 (17:13 -0300)] 
Merge pull request #500 from zonque/fileio

fileio: consolidate write_string_file*()

9 years agoMerge pull request #520 from zonque/pr-384-rework
Lennart Poettering [Wed, 8 Jul 2015 19:50:48 +0000 (16:50 -0300)] 
Merge pull request #520 from zonque/pr-384-rework

man-pages: PR 384 rework

9 years agoman: minor updates to the sd_bus_request_name() documentation 520/head
Lennart Poettering [Tue, 23 Jun 2015 19:41:15 +0000 (21:41 +0200)] 
man: minor updates to the sd_bus_request_name() documentation

9 years agoman: document user slice sd-login calls we added a while back
Lennart Poettering [Tue, 23 Jun 2015 19:22:56 +0000 (21:22 +0200)] 
man: document user slice sd-login calls we added a while back

9 years agoman: fix sd_bus_negotiate_timestamps documentation link-up
Lennart Poettering [Tue, 23 Jun 2015 18:44:15 +0000 (20:44 +0200)] 
man: fix sd_bus_negotiate_timestamps documentation link-up

9 years agoman: fully document sd_bus_creds subsystem
Lennart Poettering [Tue, 23 Jun 2015 18:42:57 +0000 (20:42 +0200)] 
man: fully document sd_bus_creds subsystem

[@zonque: typo fixed, reported by @ronnychevalier]

9 years agoman: fully document sd-bus' error APIs
Lennart Poettering [Tue, 23 Jun 2015 17:37:28 +0000 (19:37 +0200)] 
man: fully document sd-bus' error APIs

[@zonque: Some minor nits fixed as pointed out by @ronnychevalier,
 dropped class='sd-bus-errors' to fix python logic]

9 years agoMerge pull request #519 from poettering/man-bus-message-append
Daniel Mack [Wed, 8 Jul 2015 16:17:47 +0000 (12:17 -0400)] 
Merge pull request #519 from poettering/man-bus-message-append

man: update and extend the various sd_bus_message_append_*() man pages

9 years agoMerge pull request #514 from teg/resolved-rrsig-marshal
Lennart Poettering [Wed, 8 Jul 2015 16:00:20 +0000 (13:00 -0300)] 
Merge pull request #514 from teg/resolved-rrsig-marshal

resolved: fix marshalling of RRSIG records

9 years agoMerge pull request #515 from xnox/no-dot-files
Lennart Poettering [Wed, 8 Jul 2015 15:46:49 +0000 (12:46 -0300)] 
Merge pull request #515 from xnox/no-dot-files

automake: Do not install developer files on end-user systems.

9 years agoMerge pull request #510 from zonque/journal-gatewayd
Tom Gundersen [Wed, 8 Jul 2015 14:16:44 +0000 (16:16 +0200)] 
Merge pull request #510 from zonque/journal-gatewayd

journal-gatewayd: fix tmpfile logic

9 years agoMerge pull request #501 from keszybz/remove-python-systemd
Daniel Mack [Wed, 8 Jul 2015 13:38:38 +0000 (09:38 -0400)] 
Merge pull request #501 from keszybz/remove-python-systemd

Remove python-systemd

9 years agoautomake: Do not install developer files on end-user systems. 515/head
Dimitri John Ledkov [Wed, 8 Jul 2015 11:37:47 +0000 (12:37 +0100)] 
automake: Do not install developer files on end-user systems.

autogen.sh, .dir-locals.el, .vimrc, .ycm_extra_conf.py, .travis.yml,
.mailmap files are only useful with the source tree, for the
developers. Do not install these files as documentation on the
end-user systems, but keep them distributed with the tarball.

9 years agoresolved: fix marshalling of RRSIG records 514/head
Tom Gundersen [Wed, 8 Jul 2015 11:52:48 +0000 (13:52 +0200)] 
resolved: fix marshalling of RRSIG records

The key tag is 16, not 8 bits.

9 years agojournal-gatewayd: fix tmpfile logic 510/head
Daniel Mack [Tue, 7 Jul 2015 21:21:03 +0000 (17:21 -0400)] 
journal-gatewayd: fix tmpfile logic

"rw" is not a valid mode string for f*open(). This got broken in
cc02a7b33049 ("journal-gatewayd: factor out opening of temp
file").

9 years agoman: update and extend the various sd_bus_message_append_*() man pages 519/head
Lennart Poettering [Tue, 7 Jul 2015 18:35:45 +0000 (20:35 +0200)] 
man: update and extend the various sd_bus_message_append_*() man pages

Some calls changed their signature since the man pages were written.
Also extend on a number of details.

9 years agoMerge pull request #509 from dvdhrm/logind v222
Kay Sievers [Tue, 7 Jul 2015 17:43:28 +0000 (19:43 +0200)] 
Merge pull request #509 from dvdhrm/logind

logind: fix CreateSession for lightdm

9 years agologind: fail on CreateSession if already in session 509/head
David Herrmann [Tue, 7 Jul 2015 17:38:41 +0000 (19:38 +0200)] 
logind: fail on CreateSession if already in session

Right now, if you're already in a session and call CreateSession, we
return information about the current session of yours. This is highy
confusing and a nasty hack. Avoid that, and instead return a commonly
known error, so the caller can detect that.

This has the side-effect, that we no longer override XDG_VTNR and XDG_SEAT
in pam_systemd, if you're already in a session. But this sounds like the
right thing to do, anyway.

9 years agohwdb: Update database of Bluetooth company identifiers
Marcel Holtmann [Tue, 7 Jul 2015 17:22:10 +0000 (19:22 +0200)] 
hwdb: Update database of Bluetooth company identifiers

9 years agologind: allow sessions to share a VT if it's a greeter
David Herrmann [Tue, 7 Jul 2015 17:13:52 +0000 (19:13 +0200)] 
logind: allow sessions to share a VT if it's a greeter

Old gdm and lightdm start the user-session during login before they
destroy the greeter-session. Therefore, the user-session will take over
the VT from the greeter. We recently prevented this by never allowing
multiple sessions on the same VT. Fix this now, by explicitly allowing
this if the owning session is a GREETER.

Note that gdm no longer behaves like this. Instead, due to wayland, they
always use a different VT for each session. All other login-managers are
highly encouraged to destroy the greeter-session _before_ starting the
user-session. We now work around this, but this will probably not last
forever (and will already have nasty side-effects on the greeter-session).

9 years agoBump version to 222
David Herrmann [Tue, 7 Jul 2015 15:13:39 +0000 (17:13 +0200)] 
Bump version to 222

9 years agoRemove repeated 'the's
Zbigniew Jędrzejewski-Szmek [Tue, 7 Jul 2015 11:40:53 +0000 (07:40 -0400)] 
Remove repeated 'the's

9 years agoNEWS: give packagers a heads-up on the upcoming python bindings removal
Daniel Mack [Tue, 7 Jul 2015 01:19:57 +0000 (21:19 -0400)] 
NEWS: give packagers a heads-up on the upcoming python bindings removal

9 years agoMerge pull request #502 from keszybz/login-small-cleanup
Daniel Mack [Tue, 7 Jul 2015 00:45:17 +0000 (20:45 -0400)] 
Merge pull request #502 from keszybz/login-small-cleanup

Login small cleanup

9 years agoRemove python-systemd 501/head
Zbigniew Jędrzejewski-Szmek [Tue, 7 Jul 2015 00:32:12 +0000 (20:32 -0400)] 
Remove python-systemd

python-system has moved to it's own repository:
https://github.com/systemd/python-systemd

9 years agotreewide: fix typos of let's
Zbigniew Jędrzejewski-Szmek [Tue, 7 Jul 2015 00:09:54 +0000 (20:09 -0400)] 
treewide: fix typos of let's

9 years agologin: use normal comparison to zero for integers 502/head
Zbigniew Jędrzejewski-Szmek [Tue, 7 Jul 2015 00:04:13 +0000 (20:04 -0400)] 
login: use normal comparison to zero for integers

! is supposed to be used for booleans and pointers.

9 years agotree-wide: fix write_string_file() user that should not create files 500/head
Daniel Mack [Mon, 6 Jul 2015 23:27:20 +0000 (19:27 -0400)] 
tree-wide: fix write_string_file() user that should not create files

The latest consolidation cleanup of write_string_file() revealed some users
of that helper which should have used write_string_file_no_create() in the
past but didn't. Basically, all existing users that write to files in /sys
and /proc should not expect to write to a file which is not yet existant.

9 years agofileio: consolidate write_string_file*()
Daniel Mack [Mon, 6 Jul 2015 23:19:25 +0000 (19:19 -0400)] 
fileio: consolidate write_string_file*()

Merge write_string_file(), write_string_file_no_create() and
write_string_file_atomic() into write_string_file() and provide a flags mask
that allows combinations of atomic writing, newline appending and automatic
file creation. Change all users accordingly.

9 years agofileio: add 'enforce_newline' argument to write_string_stream()
Daniel Mack [Mon, 6 Jul 2015 21:31:44 +0000 (17:31 -0400)] 
fileio: add 'enforce_newline' argument to write_string_stream()

Add a flag to control whether write_string_stream() should always enforce a
trailing newline character in the file.

9 years agoget_process_environ: exit early when there is nothing to read
Kay Sievers [Mon, 6 Jul 2015 21:00:49 +0000 (23:00 +0200)] 
get_process_environ: exit early when there is nothing to read

9 years agoMerge pull request #492 from richardmaw-codethink/nspawn-automatic-uid-shift-fix-v2
Lennart Poettering [Mon, 6 Jul 2015 18:53:56 +0000 (20:53 +0200)] 
Merge pull request #492 from richardmaw-codethink/nspawn-automatic-uid-shift-fix-v2

nspawn: Communicate determined UID shift to parent version 2

9 years agoMerge pull request #497 from phomes/master
Daniel Mack [Mon, 6 Jul 2015 18:45:50 +0000 (14:45 -0400)] 
Merge pull request #497 from phomes/master

man: sd-bus: typo fix

9 years agoMerge pull request #496 from poettering/ipv6-privacy
Daniel Mack [Mon, 6 Jul 2015 18:44:33 +0000 (14:44 -0400)] 
Merge pull request #496 from poettering/ipv6-privacy

networkd: various fixes for the IPv6 privacy extensions support

9 years agoman: sd-bus: typo fix 497/head
Thomas Hindoe Paaboel Andersen [Mon, 6 Jul 2015 18:34:09 +0000 (20:34 +0200)] 
man: sd-bus: typo fix

9 years agonetworkd: various fixes for the IPv6 privacy extensions support 496/head
Lennart Poettering [Mon, 6 Jul 2015 18:29:33 +0000 (20:29 +0200)] 
networkd: various fixes for the IPv6 privacy extensions support

- Make sure that the IPv6PrivacyExtensions=yes results in
  prefer-temporary, not prefer-public.

- Introduce special enum value "kernel" to leave setting unset, similar
  how we have it for the IP forwarding settings.

- Bring the enum values in sync with the the strings we parse for them,
  to the level this makes sense (specifically, rename "disabled" to
  "no", and "prefer-temporary" to "yes").

- Make sure we really set the value to to "no" by default, the way it is
  already documented in the man page.

- Fix whitespace error.

- Make sure link_ipv6_privacy_extensions() actually returns the correct
  enum type, rather than implicitly casting it to "bool".

- properly size formatting buffer for ipv6 sysctl value

- Don't complain if /proc/sys isn't writable

- Document that the enum follows the kernel's own values (0 = off, 1 =
  prefer-public, 2 = prefer-temporary)

- Drop redundant negating of error code passed to log_syntax()

- Manpage fixes

This fixes a number of issues from PR #417

9 years agoMerge pull request #495 from poettering/forwarding-fix
Daniel Mack [Mon, 6 Jul 2015 18:22:23 +0000 (14:22 -0400)] 
Merge pull request #495 from poettering/forwarding-fix

networkd: be more defensive when writing to ipv4/ipv6 forwarding sett…

9 years agoNEWS: mention ipv6 privacy extensions
David Herrmann [Mon, 6 Jul 2015 17:07:10 +0000 (19:07 +0200)] 
NEWS: mention ipv6 privacy extensions

9 years agobus-proxyd: fix log message and explain dbus-1 compat matches
Kay Sievers [Mon, 6 Jul 2015 15:54:40 +0000 (17:54 +0200)] 
bus-proxyd: fix log message and explain dbus-1 compat matches

9 years agodocs: add .gitignore
Kay Sievers [Mon, 6 Jul 2015 15:46:43 +0000 (17:46 +0200)] 
docs: add .gitignore

9 years agobus-proxyd: subscribe to unicast signals directed to the proxy connection
Kay Sievers [Mon, 6 Jul 2015 15:45:26 +0000 (17:45 +0200)] 
bus-proxyd: subscribe to unicast signals directed to the proxy connection

9 years agosd-bus: support matching on destination names
David Herrmann [Mon, 6 Jul 2015 15:43:36 +0000 (17:43 +0200)] 
sd-bus: support matching on destination names

Right now, we never install destination matches on kdbus as the kernel did
not support MATCH rules on those. With the introduction of
KDBUS_ITEM_DST_ID we can now match on destination IDs, so add explicit
support for those.

This requires a recent kdbus module to work. However, there seems to be no
user-space that uses "Destination=''" matches, yet, so old kdbus modules
still work fine (we couldn't find any real user).

This is needed to match on unicast signals in bus-proxy. A followup will
add support for this.

9 years agoMerge pull request #491 from torstehu/fix-typo
Daniel Mack [Mon, 6 Jul 2015 13:00:04 +0000 (09:00 -0400)] 
Merge pull request #491 from torstehu/fix-typo

treewide: fix typos

9 years agonspawn: Communicate determined UID shift to parent 492/head
Richard Maw [Tue, 30 Jun 2015 13:41:41 +0000 (13:41 +0000)] 
nspawn: Communicate determined UID shift to parent

There is logic to determine the UID shift from the file-system, rather
than having it be explicitly passed in.

However, this needs to happen in the child process that sets up the
mounts, as what's important is the UID of the mounted root, rather than
the mount-point.

Setting up the UID map needs to happen in the parent becuase the inner
child needs to have been started, and the outer child is no longer able
to access the uid_map file, since it lost access to it when setting up
the mounts for the inner child.

So we need to communicate the uid shift back out, along with the PID of
the inner child process.

Failing to communicate this means that the invalid UID shift, which is
the value used to specify "this needs to be determined from the file
system" is left invalid, so setting up the user namespace's UID shift
fails.

9 years agonetworkd: be more defensive when writing to ipv4/ipv6 forwarding settings 495/head
Lennart Poettering [Mon, 6 Jul 2015 11:38:47 +0000 (13:38 +0200)] 
networkd: be more defensive when writing to ipv4/ipv6 forwarding settings

1) never bother with setting the flag for loopback devices

2) if we fail to write the flag due to EROFS (which is likely to happen
   in containers where /proc/sys is read-only) or any other error, check
   if the flag already has the right value. If so, don't complain.

Closes #469

9 years agotreewide: fix typos 491/head
Torstein Husebø [Thu, 2 Jul 2015 13:18:29 +0000 (15:18 +0200)] 
treewide: fix typos

9 years agoupdate TODO
Lennart Poettering [Mon, 6 Jul 2015 10:35:58 +0000 (12:35 +0200)] 
update TODO

9 years agonspawn: fix indenting
Lennart Poettering [Mon, 6 Jul 2015 10:35:51 +0000 (12:35 +0200)] 
nspawn: fix indenting

9 years agoMerge pull request #443 from ssahani/lldp
Tom Gundersen [Mon, 6 Jul 2015 09:35:12 +0000 (11:35 +0200)] 
Merge pull request #443 from ssahani/lldp

lldp: set correct state for processing

9 years agoMerge pull request #417 from ssahani/ipv6-private
Daniel Mack [Sun, 5 Jul 2015 17:08:13 +0000 (13:08 -0400)] 
Merge pull request #417 from ssahani/ipv6-private

Ipv6 private extensions

9 years agologin: simplify assignment
Zbigniew Jędrzejewski-Szmek [Sun, 5 Jul 2015 16:02:20 +0000 (12:02 -0400)] 
login: simplify assignment

9 years agorules: block - add dasd to whitelist
Kay Sievers [Sun, 5 Jul 2015 14:22:30 +0000 (16:22 +0200)] 
rules: block - add dasd to whitelist

9 years agobuild-sys: bump sonames
Kay Sievers [Sun, 5 Jul 2015 14:10:03 +0000 (16:10 +0200)] 
build-sys: bump sonames

9 years agohwdb: update
Kay Sievers [Sun, 5 Jul 2015 14:05:54 +0000 (16:05 +0200)] 
hwdb: update

9 years agoNEWS: update
Kay Sievers [Sun, 5 Jul 2015 14:02:13 +0000 (16:02 +0200)] 
NEWS: update

9 years agocore: fix missing bus-util.h include
David Herrmann [Sun, 5 Jul 2015 10:24:29 +0000 (12:24 +0200)] 
core: fix missing bus-util.h include

Whoopsy, forgot to 'git add' this, sorry.

9 years agocore: don't mount kdbusfs if not wanted
David Herrmann [Sun, 5 Jul 2015 09:25:38 +0000 (11:25 +0200)] 
core: don't mount kdbusfs if not wanted

Just like we conditionalize loading kdbus.ko, we should conditionalize
mounting kdbusfs. Otherwise, we might run with kdbus if it is builtin,
even though the user didn't want this.

9 years agoNEWS: mention accelerometer removal for 222
David Herrmann [Sun, 5 Jul 2015 09:04:59 +0000 (11:04 +0200)] 
NEWS: mention accelerometer removal for 222

Add NEWS entry for 222 and mention the removal of the udev accelerometer.
iio-sensor-proxy-1.0 is required if you want orientation data to still
work.

9 years agoTODO: remove ipv6 Ipv6 privacy extensions 417/head
Susant Sahani [Sun, 5 Jul 2015 05:55:54 +0000 (11:25 +0530)] 
TODO: remove ipv6 Ipv6 privacy extensions

9 years agoman: add manual for ipv6 privacy extension
Susant Sahani [Sun, 5 Jul 2015 05:55:20 +0000 (11:25 +0530)] 
man: add manual for ipv6 privacy extension

9 years agonetworkd: Add support for ipv6 privacy extension
Susant Sahani [Sun, 5 Jul 2015 05:54:31 +0000 (11:24 +0530)] 
networkd: Add support for ipv6 privacy extension

This patch add support for ipv6 privacy extensions.

The variable  /proc/sys/net/ipv6/conf/<if>/use_tempaddr

can be changed via the boolean

IPv6PrivacyExtensions=[yes/no/prefer-temporary]

When true enables privacy extensions, but prefer public addresses over
temporary addresses.
prefer-temporary  prefers temporary adresses over public addresses.
Defaults to false.

[Match]
Name=enp0s25

[Network]
IPv6PrivacyExtensions=prefer-temporary

9 years agoMerge pull request #488 from miguelinux/boot
Zbigniew Jędrzejewski-Szmek [Sat, 4 Jul 2015 23:47:48 +0000 (19:47 -0400)] 
Merge pull request #488 from miguelinux/boot

bootctl: fix sdboot to systemd-boot

9 years agobootctl: fix sdboot to systemd-boot 488/head
Miguel Bernal Marin [Sat, 4 Jul 2015 22:03:50 +0000 (17:03 -0500)] 
bootctl: fix sdboot to systemd-boot

sdboot was renamed to systemd-boot

Fixes: e7dd673d1e0a ("gummiboot/sd-boot/systemd-boot: rename galore")
Signed-off-by: Miguel Bernal Marin <miguel.bernal.marin@linux.intel.com>
9 years agoman: fix sysctl references in networkd-manpage
David Herrmann [Sat, 4 Jul 2015 11:08:29 +0000 (13:08 +0200)] 
man: fix sysctl references in networkd-manpage

We refer to the same sysctl-setting twice, which is misleading. Correctly
list all global forwarding options. As we _always_ change the forwarding
setting on links, they will get disabled by default. The global sysctl
defaults thus will not have any effect.

9 years agoMerge pull request #485 from poettering/sd-bus-flush-close-unref
David Herrmann [Sat, 4 Jul 2015 10:41:01 +0000 (12:41 +0200)] 
Merge pull request #485 from poettering/sd-bus-flush-close-unref

sd-bus: introduce new sd_bus_flush_close_unref() call

9 years agocore: fix coding style in agent-handling
David Herrmann [Sat, 4 Jul 2015 10:19:32 +0000 (12:19 +0200)] 
core: fix coding style in agent-handling

Avoid late bail-out based on a condition. This makes code hard to read.
Instead, reverse the forwarding-condition.

9 years agocore: harden cgroups-agent forwarding
David Herrmann [Sat, 4 Jul 2015 10:14:45 +0000 (12:14 +0200)] 
core: harden cgroups-agent forwarding

On dbus1, we receive systemd1.Agent signals via the private socket, hence
it's trusted. However, on kdbus we receive it on the system bus. We must
make sure it's sent by UID=0, otherwise unprivileged users can fake it.

Furthermore, never forward broadcasts we sent ourself. This might happen
on kdbus, as we forward the message on the same bus we received it on,
thus ending up in an endless loop.

9 years agobusctl: flush stdout after dumping data
David Herrmann [Sat, 4 Jul 2015 10:11:22 +0000 (12:11 +0200)] 
busctl: flush stdout after dumping data

Running `busctl monitor` currently buffers data for several seconds /
kilobytes before writing stdout. This is highly confusing if you dump in a
file, ^C busctl and then end up with a file with data of the last few
_seconds_ missing.

Fix this by explicitly flushing after each signal.

9 years agoMerge pull request #484 from xnox/persistent-journal
Lennart Poettering [Fri, 3 Jul 2015 18:08:14 +0000 (20:08 +0200)] 
Merge pull request #484 from xnox/persistent-journal

journal: in persistent mode create /var/log/journal, with all parents.

9 years agosd-bus: introduce new sd_bus_flush_close_unref() call 485/head
Lennart Poettering [Fri, 3 Jul 2015 17:49:03 +0000 (19:49 +0200)] 
sd-bus: introduce new sd_bus_flush_close_unref() call

sd_bus_flush_close_unref() is a call that simply combines sd_bus_flush()
(which writes all unwritten messages out) + sd_bus_close() (which
terminates the connection, releasing all unread messages) +
sd_bus_unref() (which frees the connection).

The combination of this call is used pretty frequently in systemd tools
right before exiting, and should also be relevant for most external
clients, and is hence useful to cover in a call of its own.

Previously the combination of the three calls was already done in the
_cleanup_bus_close_unref_ macro, but this was only available internally.

Also see #327

9 years agoMerge pull request #478 from systemd/revert-429-nspawn-userns-uid-shift-autodetection-fix
Daniel Mack [Fri, 3 Jul 2015 17:04:58 +0000 (13:04 -0400)] 
Merge pull request #478 from systemd/revert-429-nspawn-userns-uid-shift-autodetection-fix

Revert "nspawn: determine_uid_shift before forking"

9 years agojournal: in persistent mode create /var/log/journal, with all parents. 484/head
Dimitri John Ledkov [Fri, 3 Jul 2015 10:34:12 +0000 (11:34 +0100)] 
journal: in persistent mode create /var/log/journal, with all parents.

systemd-journald races with systemd-tmpfiles-setup, and hence both are
started at about the same time. On a bare-bones system (e.g. with
empty /var, or even non-existent /var), systemd-tmpfiles will create
/var/log. But it can happen too late, that is systemd-journald already
attempted to mkdir /var/log/journal, ignoring the error. Thus failing
to create /var/log/journal. One option, without modifiying the
dependency graph is to create /var/log/journal directory with parents,
when persistent storage has been requested.

9 years agoMerge pull request #480 from rinrinne/fix-message
Lennart Poettering [Fri, 3 Jul 2015 10:54:22 +0000 (12:54 +0200)] 
Merge pull request #480 from rinrinne/fix-message

Fix error message for enumerate addresses

9 years agoRevert "nspawn: determine_uid_shift before forking" 478/head
Lennart Poettering [Fri, 3 Jul 2015 10:30:53 +0000 (12:30 +0200)] 
Revert "nspawn: determine_uid_shift before forking"

9 years agoFix error message for enumerate addresses 480/head
rinrinne [Fri, 3 Jul 2015 10:13:35 +0000 (19:13 +0900)] 
Fix error message for enumerate addresses

Error message for enumerating addresses was not 'addresses' but 'links'.
This patch fixes it.

9 years agoMerge pull request #473 from richardmaw-codethink/machinectl-import-earlier-than...
Lennart Poettering [Fri, 3 Jul 2015 08:11:33 +0000 (10:11 +0200)] 
Merge pull request #473 from richardmaw-codethink/machinectl-import-earlier-than-3-15

util: fall back in rename_noreplace when renameat2 isn't implemented

9 years agologin: add rule for qemu's pci-bridge-seat
Gerd Hoffmann [Mon, 29 Jun 2015 07:42:11 +0000 (09:42 +0200)] 
login: add rule for qemu's pci-bridge-seat

Qemu provides a separate pci-bridge exclusively for multi-seat setups.
The normal pci-pci bridge ("-device pci-bridge") has 1b36:0001. The new
pci-bridge-seat was specifically added to simplify guest-side
multiseat configuration.  It is identical to the normal pci-pci bridge,
except that it has a different id (1b36:000a) so we can match it and
configure multiseating automatically.

Make sure we always treat this as separate seat if we detect this, just
like other "Pluggable" devices.

(David: write commit-message)

9 years agoutil: fall back in rename_noreplace when renameat2 isn't implemented 473/head
Richard Maw [Thu, 2 Jul 2015 13:04:34 +0000 (13:04 +0000)] 
util: fall back in rename_noreplace when renameat2 isn't implemented

According to README we only need 3.7, and while it may also make sense
to bump that requirement when appropriate, it's trivial to fall back
when renameat2 is not available.

9 years agoMerge pull request #472 from keszybz/documentation-updates2
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:41:32 +0000 (09:41 -0400)] 
Merge pull request #472 from keszybz/documentation-updates2

Documentation updates

9 years agoMerge pull request #470 from marineam/escape
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:25:59 +0000 (09:25 -0400)] 
Merge pull request #470 from marineam/escape

escape: fix exit code

9 years agoMerge pull request #427 from keszybz/man-list-fixes
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:24:04 +0000 (09:24 -0400)] 
Merge pull request #427 from keszybz/man-list-fixes

Update Makefile-man.am after recent changes and fix regeneration of Makefile-man.am
Fixes fallout from https://github.com/systemd/systemd/pull/282.

9 years agoman: update sysctl example about netfilter 472/head
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 00:34:45 +0000 (20:34 -0400)] 
man: update sysctl example about netfilter

It turns out that since kernel 3.18 netfilter on bridged packets
is off anyway, so the example should be reworded (and the module
name updated).

9 years agoman: information about available properties
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 00:19:56 +0000 (20:19 -0400)] 
man: information about available properties

https://bugzilla.redhat.com/show_bug.cgi?id=1144496

9 years agosd-bus: don't leak kdbus notifications
David Herrmann [Thu, 2 Jul 2015 10:14:27 +0000 (12:14 +0200)] 
sd-bus: don't leak kdbus notifications

When we get notifications from the kernel, we always turn them into
synthetic dbus1 messages. This means, we do *not* consume the kdbus
message, and as such have to free the offset.

Right now, the translation-helpers told the caller that they consumed the
message, which is wrong. Fix this by explicitly releasing all kernel
messages that are translated.

9 years agoescape: fix exit code 470/head
Michael Marineau [Thu, 2 Jul 2015 06:46:42 +0000 (23:46 -0700)] 
escape: fix exit code

r == 0 indicates success, not failure

9 years agolldp: set correct state for processing 443/head
Susant Sahani [Thu, 2 Jul 2015 03:30:02 +0000 (09:00 +0530)] 
lldp: set correct state for processing

ldp_receive_frame after correct processing of the packet the state
should be LLDP_AGENT_RX_WAIT_FOR_FRAME not LLDP_AGENT_RX_UPDATE_INFO.

9 years agoMerge pull request #409 from teg/networkd-enslave-segfault
Daniel Mack [Wed, 1 Jul 2015 23:26:01 +0000 (19:26 -0400)] 
Merge pull request #409 from teg/networkd-enslave-segfault

fix segfault when cancelling enslaving of links by netdevs

9 years agoMerge pull request #466 from rivanvx/master
Daniel Mack [Wed, 1 Jul 2015 23:01:28 +0000 (19:01 -0400)] 
Merge pull request #466 from rivanvx/master

timedatectl: trim non-local RTC warning to 80 chars wide

9 years agotimedatectl: trim non-local RTC warning to 80 chars wide 466/head
Vedran Miletić [Wed, 1 Jul 2015 22:13:31 +0000 (00:13 +0200)] 
timedatectl: trim non-local RTC warning to 80 chars wide

9 years agoMerge pull request #459 from ctrochalakis/reuse-port-before-bind
Daniel Mack [Wed, 1 Jul 2015 20:52:02 +0000 (16:52 -0400)] 
Merge pull request #459 from ctrochalakis/reuse-port-before-bind

socket: Set SO_REUSEPORT before bind()

9 years agoMerge pull request #419 from eworm-de/man-protecthome
Daniel Mack [Wed, 1 Jul 2015 17:45:33 +0000 (13:45 -0400)] 
Merge pull request #419 from eworm-de/man-protecthome

man: ProtectHome= protects /root as well

9 years agoMerge pull request #463 from dvdhrm/udev-run
Daniel Mack [Wed, 1 Jul 2015 17:42:16 +0000 (13:42 -0400)] 
Merge pull request #463 from dvdhrm/udev-run

udev: destroy manager before cleaning environment

9 years agoudev: destroy manager before cleaning environment 463/head
David Herrmann [Wed, 1 Jul 2015 17:25:30 +0000 (19:25 +0200)] 
udev: destroy manager before cleaning environment

Due to our _cleanup_ usage for the udev manager, it will be destroyed
after the "exit:" label has finished. Therefore, it is the last
destruction done in main(). This has two side-effects:
  - mac_selinux is destroyed before the udev manager is, possible causing
    use-after-free if the manager-cleanup accesses selinux data
  - log_close() is called *before* the manager is destroyed, possibly
    re-opening the log if you use --debug (and thus not re-applying the
    --debug option)

Avoid this by moving the manager-handling into a new function called
run(). This function will be left before we enter the "exit:" label in
main(), hence, the manager object will be destroyed early.

9 years agoudevd: force --debug mode to stderr
Kay Sievers [Wed, 1 Jul 2015 17:20:59 +0000 (19:20 +0200)] 
udevd: force --debug mode to stderr

https://github.com/systemd/systemd/issues/462

9 years agobus-proxy: never apply policy when sending signals
David Herrmann [Wed, 1 Jul 2015 16:31:18 +0000 (18:31 +0200)] 
bus-proxy: never apply policy when sending signals

Unlike dbus-daemon, the bus-proxy does not know the receiver of a
broadcast (as the kernel has exclusive access on the bus connections).
Hence, and "destination=" matches in dbus1 policies cannot be applied.

But kdbus does not place any restrictions on *SENDING* broadcasts, anyway.
The kernel never returns EPERM to KDBUS_CMD_SEND if KDBUS_MSG_SIGNAL is
set. Instead, receiver policies are checked. Hence, stop checking sender
policies for signals in bus-proxy and leave it up to the kernel.

This fixes some network-manager bus-proxy issues where NM uses weird
dst-based matches against interface-based matches. As we cannot perform
dst-based matches, our bus-proxy cannot properly implement this policy.

9 years agologin: re-use VT-sessions if they already exist
David Herrmann [Wed, 1 Jul 2015 13:05:01 +0000 (15:05 +0200)] 
login: re-use VT-sessions if they already exist

Right now, if you start a session via 'su' or 'sudo' from within a
session, we make sure to re-use the existing session instead of creating a
new one. We detect this by reading the session of the requesting PID.

However, with gnome-terminal running as a busname-unit, and as such
running outside the session of the user, this will no longer work.
Therefore, this patch makes sure to return the existing session of a VT if
you start a new one.

This has the side-effect, that you will re-use a session which your PID is
not part of. This works fine, but will break assumptions if the parent
session dies (and as such close your session even though you think you're
part of it). However, this should be perfectly fine. If you run multiple
logins on the same session, you should really know what you're doing. The
current way of silently accepting it but choosing the last registered
session is just weird.

9 years agoMerge pull request #460 from xnox/bootchart-warning
Daniel Mack [Wed, 1 Jul 2015 14:34:40 +0000 (10:34 -0400)] 
Merge pull request #460 from xnox/bootchart-warning

bootchart: do not report warning when disk is missing model.

9 years agobootchart: do not report warning when disk is missing model. 460/head
Dimitri John Ledkov [Wed, 1 Jul 2015 13:49:15 +0000 (14:49 +0100)] 
bootchart: do not report warning when disk is missing model.

In VMs / virtio drives there is no model. Also don't print "Disk:
(null)" in output if no model is available.

9 years agosocket: Set SO_REUSEPORT before bind() 459/head
Christos Trochalakis [Wed, 1 Jul 2015 11:39:53 +0000 (14:39 +0300)] 
socket: Set SO_REUSEPORT before bind()

bind() fails if it is called before setting SO_REUSEPORT and another
process is already binded to the same addess.

A new reuse_port option has been introduced to socket_address_listen()
to set the option as part of socket initialization.

9 years agosysv-generator: fix coding-style
David Herrmann [Wed, 1 Jul 2015 11:02:58 +0000 (13:02 +0200)] 
sysv-generator: fix coding-style

Fix weird coding-style:
 - proper white-space
 - no if (func() >= 0) bail-outs
 - fix braces
 - avoid 'r' for anything but errno
 - init _cleanup_ variables unconditionally, even if not needed