]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
6 years agoRevert "core: one step back again, for nspawn we actually can't wait for cgroups... v239-14
Lukas Nykryn [Thu, 25 Jun 2015 07:20:59 +0000 (09:20 +0200)] 
Revert "core: one step back again, for nspawn we actually can't wait for cgroups running empty since systemd will get exactly zero notifications about it"

This reverts commit 743970d2ea6d08aa7c7bff8220f6b7702f2b1db7.

RHEL-only
https://bugzilla.redhat.com/show_bug.cgi?id=1141137
https://github.com/systemd/systemd/pull/350

Resolves: #1703485

6 years agomeson: drop misplaced -Wl,--undefined argument
Jussi Pakkanen [Sat, 6 Apr 2019 19:59:06 +0000 (21:59 +0200)] 
meson: drop misplaced -Wl,--undefined argument

Ld's man page says the following:

  -u symbol
  --undefined=symbol

  Force symbol to be entered in the output file as an undefined symbol. Doing
  this may, for example, trigger linking of additional modules from standard
  libraries. -u may be repeated with different option arguments to enter
  additional undefined symbols. This option is equivalent to the "EXTERN"
  linker script command.

  If this option is being used to force additional modules to be pulled into
  the link, and if it is an error for the symbol to remain undefined, then the
  option --require-defined should be used instead.

This would imply that it always requires an argument, which this does not
pass. Thus it will grab the next argument on the command line as its
argument. Before it took one of the many -lrt args (presumably) and now it
grabs something other random linker argument and things break.

[zj: this line was added in the first version of the meson configuration back
in 5c23128daba7236a6080383b2a5649033cfef85c. AFAICT, this was a mistake. No
such flag appeared in Makefile.am at the time.]

https://github.com/mesonbuild/meson/issues/5113
(cherry picked from commit 700805f6c546f2adb79059614f3747f7b5474325)

6 years agosd-bus: if we receive an invalid dbus message, ignore and proceeed
Lennart Poettering [Wed, 13 Feb 2019 15:51:22 +0000 (16:51 +0100)] 
sd-bus: if we receive an invalid dbus message, ignore and proceeed

dbus-daemon might have a slightly different idea of what a valid msg is
than us (for example regarding valid msg and field sizes). Let's hence
try to proceed if we can and thus drop messages rather than fail the
connection if we fail to validate a message.

Hopefully the differences in what is considered valid are not visible
for real-life usecases, but are specific to exploit attempts only.

(cherry-picked from commit 6d586a13717ae057aa1b4127400c3de61cd5b9e7)

Related: #1678641

6 years agoAllocate temporary strings to hold dbus paths on the heap
Riccardo Schirone [Mon, 4 Feb 2019 13:29:28 +0000 (14:29 +0100)] 
Allocate temporary strings to hold dbus paths on the heap

Paths are limited to BUS_PATH_SIZE_MAX but the maximum size is anyway too big
to be allocated on the stack, so let's switch to the heap where there is a
clear way to understand if the allocation fails.

(cherry-picked from commit f519a19bcd5afe674a9b8fc462cd77d8bad403c1)

Related: #1678641

6 years agoRefuse dbus message paths longer than BUS_PATH_SIZE_MAX limit.
Riccardo Schirone [Mon, 4 Feb 2019 13:29:09 +0000 (14:29 +0100)] 
Refuse dbus message paths longer than BUS_PATH_SIZE_MAX limit.

Even though the dbus specification does not enforce any length limit on the
path of a dbus message, having to analyze too long strings in PID1 may be
time-consuming and it may have security impacts.

In any case, the limit is set so high that real-life applications should not
have a problem with it.

(cherry-picked from commit 61397a60d98e368a5720b37e83f3169e3eb511c4)

Related: #1678641

6 years agobus-socket: Fix line_begins() to accept word matching full string
Filipe Brandenburger [Tue, 17 Jul 2018 18:32:40 +0000 (11:32 -0700)] 
bus-socket: Fix line_begins() to accept word matching full string

The switch to memory_startswith() changed the logic to only look for a space or
NUL byte after the matched word, but matching the full size should also be
acceptable.

This changed the behavior of parsing of "AUTH\r\n", where m will be set to 4,
since even though the word will match, the check for it being followed by ' '
or NUL will make line_begins() return false.

Tested:

- Using netcat to connect to the private socket directly:
  $ echo -ne '\0AUTH\r\n' | sudo nc -U /run/systemd/private
  REJECTED EXTERNAL ANONYMOUS

- Running the Ignition blackbox test:
  $ sudo sh -c 'PATH=$PWD/bin/amd64:$PATH ./tests.test'
  PASS

Fixes: d27b725abf64a19a6b2f99332b663f17ad046771
(cherry picked from commit 3f10c66270b74530339b3f466c43874bb40c210f)

Resolves: #1692991

6 years agotest: don't overwrite TESTDIR if already set
Frantisek Sumsal [Tue, 12 Mar 2019 21:44:25 +0000 (22:44 +0100)] 
test: don't overwrite TESTDIR if already set

(cherry picked from commit 3f50fff536d715aee5e5195ec60e2af047b73c7f)

6 years agotests: also run TEST-01-BASIC in an unprivileged container (#9957)
Evgeny Vereshchagin [Thu, 30 Aug 2018 04:01:18 +0000 (07:01 +0300)] 
tests: also run TEST-01-BASIC in an unprivileged container (#9957)

This should make it much easier to catch regressions like
https://github.com/systemd/systemd/issues/9914 and
https://github.com/systemd/systemd/issues/8535.

(cherry picked from commit 746fbd9c34af5ed8b6d9aa7a9cbd7cac63a3afce)

6 years agotests: allow passing additional arguments to nspawn via NSPAWN_ARGUMENTS
Evgeny Vereshchagin [Thu, 5 Jul 2018 16:30:52 +0000 (16:30 +0000)] 
tests: allow passing additional arguments to nspawn via NSPAWN_ARGUMENTS

(cherry picked from commit 57916ea352b85153ecbed803d52861ca8b933dd3)

6 years agotests: use the asan wrapper to boot a VM/container if systemd is built with ASAN
Evgeny Vereshchagin [Thu, 5 Jul 2018 15:14:07 +0000 (15:14 +0000)] 
tests: use the asan wrapper to boot a VM/container if systemd is built with ASAN

(cherry picked from commit 016fa3b9e8c3550d49f659c49b5ff4d93337aefe)

6 years agotests: redirect ASAN reports on journald to a file
Evgeny Vereshchagin [Tue, 3 Jul 2018 19:29:42 +0000 (19:29 +0000)] 
tests: redirect ASAN reports on journald to a file

Otherwise, they will end up in /dev/null.

(cherry picked from commit 88ed0f261ba8164a689395ddee8b92d00e073515)

6 years agotests: add a wrapper for when systemd is built with ASAN
Evgeny Vereshchagin [Tue, 3 Jul 2018 03:25:53 +0000 (03:25 +0000)] 
tests: add a wrapper for when systemd is built with ASAN

(cherry picked from commit 1786fae3668fa94359ee58a8c11031dc46459255)

6 years agotests: create the asan wrapper automatically if systemd has been built with ASAN
Evgeny Vereshchagin [Thu, 5 Jul 2018 04:09:30 +0000 (04:09 +0000)] 
tests: create the asan wrapper automatically if systemd has been built with ASAN

(cherry picked from commit ec9181d2ce4c0ad8b1c70b16a2b02a2667b1cc05)

6 years agotest: add TEST-24-UNIT-TESTS running all basic tests under containers
Yu Watanabe [Wed, 19 Sep 2018 05:30:29 +0000 (14:30 +0900)] 
test: add TEST-24-UNIT-TESTS running all basic tests under containers

(cherry picked from commit 3f6f58e03a7d22154aabe036439e7f2fb4849570)

6 years agorules: add the rule that adds elevator= kernel command line parameter
Lukas Nykryn [Tue, 26 Feb 2019 14:22:38 +0000 (15:22 +0100)] 
rules: add the rule that adds elevator= kernel command line parameter

rhel-only
Resolves: #1670126

6 years agolgtm: drop redundant newlines
Evgeny Vereshchagin [Fri, 26 Oct 2018 10:25:36 +0000 (10:25 +0000)] 
lgtm: drop redundant newlines

(cherry picked from commit 845702c63863add5606a7a7f00a959ffdcf89635)

6 years agolgtm: add a custom query for catching the use of fgets
Evgeny Vereshchagin [Fri, 26 Oct 2018 09:19:09 +0000 (09:19 +0000)] 
lgtm: add a custom query for catching the use of fgets

As everybody knows, nodoby really reads CODING_STYLE (especially
the last paragraph :-)) so let's utilize LGTM to help us catch the
use of fgets.

(cherry picked from commit f86c1da28340f2a2afd34d72c9f416a2a94219a8)

6 years agotools: use print function in Python 3 code
Lucas Werkmeister [Sat, 25 Aug 2018 16:41:42 +0000 (18:41 +0200)] 
tools: use print function in Python 3 code

This GDB script was converted to use Python 3 along with all other
Python scripts in commit b95f5528cc, but still used the Python 2 print
statement syntax instead of the Python 3 print function. Fix that.

We also add the Python 2 compatibility statement, just in case some GDB
still uses Python 2 instead of Python 3.

6 years agolgtm: use python3
Yu Watanabe [Sat, 8 Dec 2018 11:51:56 +0000 (20:51 +0900)] 
lgtm: use python3

(cherry picked from commit fc1c09e1dfd2073fb49c4e7bb87102c88a551876)

6 years agoLGTM: make LGTM.com use meson from pip
Yu Watanabe [Mon, 23 Jul 2018 16:37:29 +0000 (01:37 +0900)] 
LGTM: make LGTM.com use meson from pip

(cherry picked from commit 55d651d8f69919b98cdc062e312e4454c34428ef)

6 years agorules: implement new memory hotplug policy
Jan Synacek [Wed, 30 Jan 2019 09:36:53 +0000 (10:36 +0100)] 
rules: implement new memory hotplug policy

Our new policy is based on following motivations (assumptions),
  * we want to allow the system to use hotplugged memory
  * we want memory ballon inflation to work as expected in VMs (going for small
  to big in terms of memory footprint)
  * we want to allow memory hotplug and memory hot-unplug on high-end
  enterprise server (we assume that node0 will have sufficient memory
  resources and marking all memory as movable shouldn't be a problem)

Policy:
  * nevert online memory on s390 (on both physical and z/VM)
  * mark memory as "online_movable" on physical machines
  * mark memory as "online" in VMs

If you have the feeling that all this is very wrong and we shouldn't
encode complex policies in udev rules you are absolutely right. However,
for now, we don't have any better place where to put it. In ideal world
we would have a user-space daemon that would be able to configure the
system wrt. to currently present HW and user-defined policy.

Resolves: #1670728

6 years agorule-syntax-check: allow PROGRAM as an assignment
Jan Synacek [Wed, 30 Jan 2019 11:22:41 +0000 (12:22 +0100)] 
rule-syntax-check: allow PROGRAM as an assignment

(cherry picked from commit ed2dc503da57b0110819563e0d1c85d023435e07)

6 years agorules: add elevator= kernel command line parameter v239-12
Lukas Nykryn [Tue, 12 Feb 2019 15:58:16 +0000 (16:58 +0100)] 
rules: add elevator= kernel command line parameter

Kernel removed the elevator= option, so let's reintroduce
it for rhel8 via udev rule.

rhel-only
Resolves: #1670126

6 years agotest-network: ignore tunnel devices automatically added by kernel
Yu Watanabe [Wed, 6 Feb 2019 11:02:15 +0000 (12:02 +0100)] 
test-network: ignore tunnel devices automatically added by kernel

Fixes #10934.

(cherry picked from commit e327272d795453f68a4c30ba21eb0e887516cf68)

6 years agotest: replace echo with socat
Frantisek Sumsal [Tue, 29 Jan 2019 18:33:15 +0000 (19:33 +0100)] 
test: replace echo with socat

The original version of the test used netcat along with a standard
AF_UNIX socket, which caused issues across different netcat
implementations. The AF_UNIX socket was then replaced by a FIFO with a
simple echo, which, however, suffers from the same issue (some echo
implementations don't check if the write() was successful).

Let's revert back to the AF_UNIX socket, but replace netcat with socat,
which, hopefully, resolves the main issue.

Relevant commit: 9b45c2bf02a43e3e1b42de1ab0c3fe29c64dc5f5

(cherry picked from commit b35d6d828b3216d022e565820d9971cb0f7746c1)

6 years agojournald: correctly attribute log messages also with cgroupsv1
Michal Sekletar [Fri, 14 Dec 2018 14:17:27 +0000 (15:17 +0100)] 
journald: correctly attribute log messages also with cgroupsv1

With cgroupsv1 a zombie process is migrated to root cgroup in all
hierarchies. This was changed for unified hierarchy and /proc/PID/cgroup
reports cgroup to which process belonged before it exited.

Be more suspicious about cgroup path reported by the kernel and use
unit_id provided by the log client if the kernel reports that process is
running in the root cgroup.

Users tend to care the most about 'log->unit_id' mapping so systemctl
status can correctly report last log lines. Also we wouldn't be able to
infer anything useful from "/" path anyway.

See: https://github.com/torvalds/linux/commit/2e91fa7f6d451e3ea9fec999065d2fd199691f9d

(cherry picked from commit 672773b63a4ebf95242b27e63071b93073ebc1f5)

Resolves: #1658115

6 years agojournal-remote: set a limit on the number of fields in a message
Zbigniew Jędrzejewski-Szmek [Fri, 7 Dec 2018 09:48:10 +0000 (10:48 +0100)] 
journal-remote: set a limit on the number of fields in a message

Existing use of E2BIG is replaced with ENOBUFS (entry too long), and E2BIG is
reused for the new error condition (too many fields).

This matches the change done for systemd-journald, hence forming the second
part of the fix for CVE-2018-16865
(https://bugzilla.redhat.com/show_bug.cgi?id=1653861).

(cherry-picked from commit ef4d6abe7c7fab6cbff975b32e76b09feee56074)

Resolves: #1664977

6 years agojournal-remote: verify entry length from header
Zbigniew Jędrzejewski-Szmek [Fri, 7 Dec 2018 11:47:14 +0000 (12:47 +0100)] 
journal-remote: verify entry length from header

Calling mhd_respond(), which ulimately calls MHD_queue_response() is
ineffective at point, becuase MHD_queue_response() immediately returns
MHD_NO signifying an error, because the connection is in state
MHD_CONNECTION_CONTINUE_SENT.

As Christian Grothoff kindly explained:
> You are likely calling MHD_queue_repsonse() too late: once you are
> receiving upload_data, HTTP forces you to process it all. At this time,
> MHD has already sent "100 continue" and cannot take it back (hence you
> get MHD_NO!).
>
> In your request handler, the first time when you are called for a
> connection (and when hence *upload_data_size == 0 and upload_data ==
> NULL) you must check the content-length header and react (with
> MHD_queue_response) based on this (to prevent MHD from automatically
> generating 100 continue).

If we ever encounter this kind of error, print a warning and immediately
abort the connection. (The alternative would be to keep reading the data,
but ignore it, and return an error after we get to the end of data.
That is possible, but of course puts additional load on both the
sender and reciever, and doesn't seem important enough just to return
a good error message.)

Note that sending of the error does not work (the connection is always aborted
when MHD_queue_response is used with MHD_RESPMEM_MUST_FREE, as in this case)
with libµhttpd 0.59, but works with 0.61:
https://src.fedoraproject.org/rpms/libmicrohttpd/pull-request/1

(cherry-picked from commit 7fdb237f5473cb8fc2129e57e8a0039526dcb4fd)

Related: #1664977

6 years agoµhttpd: use a cleanup function to call MHD_destroy_response
Zbigniew Jędrzejewski-Szmek [Fri, 7 Dec 2018 11:13:10 +0000 (12:13 +0100)] 
µhttpd: use a cleanup function to call MHD_destroy_response

(cherry-picked from commit d101fb24eb1c58c97f2adce1f69f4b61a788933a)

Related: #1664977

6 years agojournald: lower the maximum entry size limit to ½ for non-sealed fds
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 21:52:53 +0000 (22:52 +0100)] 
journald: lower the maximum entry size limit to ½ for non-sealed fds

We immediately read the whole contents into memory, making thigs much more
expensive. Sealed fds should be used instead since they are more efficient
on our side.

(cherry-picked from commit 6670c9de196c8e2d5e84a8890cbb68f70c4db6e3)

Related: #1664977

6 years agojournald: when processing a native message, bail more quickly on overbig messages
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 21:50:39 +0000 (22:50 +0100)] 
journald: when processing a native message, bail more quickly on overbig messages

We'd first parse all or most of the message, and only then consider if it
is not too large. Also, when encountering a single field over the limit,
we'd still process the preceding part of the message. Let's be stricter,
and check size limits early, and let's refuse the whole message if it fails
any of the size limits.

(cherry-picked from commit 964ef920ea6735d39f856b05fd8ef451a09a6a1d)

Related: #1664977

6 years agojournald: set a limit on the number of fields (1k)
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 21:45:02 +0000 (22:45 +0100)] 
journald: set a limit on the number of fields (1k)

We allocate a iovec entry for each field, so with many short entries,
our memory usage and processing time can be large, even with a relatively
small message size. Let's refuse overly long entries.

CVE-2018-16865
https://bugzilla.redhat.com/show_bug.cgi?id=1653861

What from I can see, the problem is not from an alloca, despite what the CVE
description says, but from the attack multiplication that comes from creating
many very small iovecs: (void* + size_t) for each three bytes of input message.

(cherry-picked from commit 052c57f132f04a3cf4148f87561618da1a6908b4)

Resolves: #1664977

6 years agojournal: fix syslog_parse_identifier()
Yu Watanabe [Wed, 8 Aug 2018 06:06:36 +0000 (15:06 +0900)] 
journal: fix syslog_parse_identifier()

Fixes #9829.

(cherry-picked from commit a6aadf4ae0bae185dc4c414d492a4a781c80ffe5)

Resolves: #1664978

6 years agoRevert "sysctl.d: switch net.ipv4.conf.all.rp_filter from 1 to 2"
Lukas Nykryn [Fri, 8 Feb 2019 09:54:34 +0000 (10:54 +0100)] 
Revert "sysctl.d: switch net.ipv4.conf.all.rp_filter from 1 to 2"

This reverts commit 75c9af80cf3529c76988451e63f98010c86f48f1.

Resolves: #1653824

6 years agoprocess-util: don't use overly large buffer to store process command line
Michal Sekletar [Tue, 22 Jan 2019 13:29:50 +0000 (14:29 +0100)] 
process-util: don't use overly large buffer to store process command line

Allocate new string as a return value and free our "scratch pad"
buffer that is potentially much larger than needed (up to
_SC_ARG_MAX).

Fixes #11502

(cherry-picked from commit eb1ec489eef8a32918bbfc56a268c9d10464584d)

Related: #1664976

6 years agojournald: periodically drop cache for all dead PIDs
Zbigniew Jędrzejewski-Szmek [Tue, 22 Jan 2019 16:30:48 +0000 (17:30 +0100)] 
journald: periodically drop cache for all dead PIDs

In normal use, this allow us to drop dead entries from the cache and reduces
the cache size so that we don't evict entries unnecessarily. The time limit is
there mostly to serve as a guard against malicious logging from many different
PIDs.

(cherry-picked from commit 91714a7f427a6c9c5c3be8b3819fee45050028f3)

Related: #1664976

6 years agojournal: limit the number of entries in the cache based on available memory
Zbigniew Jędrzejewski-Szmek [Tue, 22 Jan 2019 15:12:52 +0000 (16:12 +0100)] 
journal: limit the number of entries in the cache based on available memory

This is far from perfect, but should give mostly reasonable values. My
assumption is that if somebody has a few hundred MB of memory, they are
unlikely to have thousands of processes logging. A hundred would already be a
lot. So let's scale the cache size propritionally to the total memory size,
with clamping on both ends.

The formula gives 64 cache entries for each GB of RAM.

(cherry-picked from commit b12a480829c5ca8f4d4fa9cde8716b5f2f12a3ad)

Related: #1664976

6 years agobasic/prioq: add prioq_peek_item()
Zbigniew Jędrzejewski-Szmek [Sat, 26 Jan 2019 10:27:18 +0000 (11:27 +0100)] 
basic/prioq: add prioq_peek_item()

(cherry-picked from commit ef21b3b5bf824e652addf850bcfd9374c7b33ce8)

Related: #1664976

6 years agoprocfs-util: expose functionality to query total memory
Zbigniew Jędrzejewski-Szmek [Tue, 22 Jan 2019 14:43:07 +0000 (15:43 +0100)] 
procfs-util: expose functionality to query total memory

procfs_memory_get_current is renamed to procfs_memory_get_used, because
"current" can mean anything, including total memory, used memory, and free
memory, as long as the value is up to date.

No functional change.

(cherry-picked from commit c482724aa5c5d0b1391fcf958a9a3ea6ce73a085)

Related: #1664976

6 years agocoredump: fix message when we fail to save a journald coredump
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 20:34:24 +0000 (21:34 +0100)] 
coredump: fix message when we fail to save a journald coredump

If creation of the message failed, we'd write a bogus entry:
systemd-coredump[1400]: Cannot store coredump of 416 (systemd-journal): No space left on device
systemd-coredump[1400]: MESSAGE=Process 416 (systemd-journal) of user 0 dumped core.
systemd-coredump[1400]: Coredump diverted to

(cherry-picked from commit f0136e09221364f931c3a3b715da4e4d3ee9f2ac)

Related: #1664976

6 years agobasic/process-util: limit command line lengths to _SC_ARG_MAX
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 17:48:23 +0000 (18:48 +0100)] 
basic/process-util: limit command line lengths to _SC_ARG_MAX

This affects systemd-journald and systemd-coredump.

Example entry:
$ journalctl -o export -n1 'MESSAGE=Something logged'
__CURSOR=s=976542d120c649f494471be317829ef9;i=34e;b=4871e4c474574ce4a462dfe3f1c37f06;m=c7d0c37dd2;t=57c4ac58f3b98;x=67598e942bd23dc0
__REALTIME_TIMESTAMP=1544035467475864
__MONOTONIC_TIMESTAMP=858200964562
_BOOT_ID=4871e4c474574ce4a462dfe3f1c37f06
PRIORITY=6
_UID=1000
_GID=1000
_CAP_EFFECTIVE=0
_SELINUX_CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
_AUDIT_SESSION=1
_AUDIT_LOGINUID=1000
_SYSTEMD_OWNER_UID=1000
_SYSTEMD_UNIT=user@1000.service
_SYSTEMD_SLICE=user-1000.slice
_SYSTEMD_USER_SLICE=-.slice
_SYSTEMD_INVOCATION_ID=1c4a469986d448719cb0f9141a10810e
_MACHINE_ID=08a5690a2eed47cf92ac0a5d2e3cf6b0
_HOSTNAME=krowka
_TRANSPORT=syslog
SYSLOG_FACILITY=17
SYSLOG_IDENTIFIER=syslog-caller
MESSAGE=Something logged
_COMM=poc
_EXE=/home/zbyszek/src/systemd-work3/poc
_SYSTEMD_CGROUP=/user.slice/user-1000.slice/user@1000.service/gnome-terminal-server.service
_SYSTEMD_USER_UNIT=gnome-terminal-server.service
SYSLOG_PID=4108
SYSLOG_TIMESTAMP=Dec  5 19:44:27
_PID=4108
_CMDLINE=./poc AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA>
_SOURCE_REALTIME_TIMESTAMP=1544035467475848

$ journalctl -o export -n1 'MESSAGE=Something logged' --output-fields=_CMDLINE|wc
      6    2053 2097410

2MB might be hard for some clients to use meaningfully, but OTOH, it is
important to log the full commandline sometimes. For example, when the program
is crashing, the exact argument list is useful.

(cherry-picked from commit 2d5d2e0cc5171c6795d2a485841474345d9e30ab)

Related: #1664976

6 years agojournald: do not store the iovec entry for process commandline on stack
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 17:38:39 +0000 (18:38 +0100)] 
journald: do not store the iovec entry for process commandline on stack

This fixes a crash where we would read the commandline, whose length is under
control of the sending program, and then crash when trying to create a stack
allocation for it.

CVE-2018-16864
https://bugzilla.redhat.com/show_bug.cgi?id=1653855

The message actually doesn't get written to disk, because
journal_file_append_entry() returns -E2BIG.

(cherry-picked from commit 084eeb865ca63887098e0945fb4e93c852b91b0f)

Resolves: #1664976

6 years agojournald: remove unnecessary {}
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 16:53:50 +0000 (17:53 +0100)] 
journald: remove unnecessary {}

(cherry-picked from commit bc2762a309132a34db1797d8b5792d5747a94484)

Related: #1664976

6 years agocoredump: remove duplicate MESSAGE= prefix from message
Zbigniew Jędrzejewski-Szmek [Wed, 5 Dec 2018 16:33:15 +0000 (17:33 +0100)] 
coredump: remove duplicate MESSAGE= prefix from message

systemd-coredump[9982]: MESSAGE=Process 771 (systemd-journal) of user 0 dumped core.
systemd-coredump[9982]: Coredump diverted to /var/lib/systemd/coredump/core...

log_dispatch() calls log_dispatch_internal() which calls write_to_journal()
which appends MESSAGE= on its own.

(cherry-picked from commit 4f62556d71206ac814a020a954b397d4940e14c3)

Related: #1664976

6 years agotravis: reboot the container before running tests
Frantisek Sumsal [Thu, 17 Jan 2019 11:03:10 +0000 (12:03 +0100)] 
travis: reboot the container before running tests

6 years agotravis: fix syntax error in .travis.yml
Frantisek Sumsal [Tue, 15 Jan 2019 13:35:27 +0000 (14:35 +0100)] 
travis: fix syntax error in .travis.yml

(cherry picked from commit 7f9d44f527ea214347f7d3b3b067f84df53feed7)

6 years agotravis: drop the SELinux Fedora workaround
Frantisek Sumsal [Tue, 15 Jan 2019 10:03:45 +0000 (11:03 +0100)] 
travis: drop the SELinux Fedora workaround

(cherry picked from commit 90399c456fe8cf726fc04fb7be9e2a01f9ca0eae)

6 years agotravis: RHEL8 support
Frantisek Sumsal [Mon, 14 Jan 2019 13:49:32 +0000 (14:49 +0100)] 
travis: RHEL8 support

(cherry picked from commit e5c78840b2b124400f56cb5fbaf2357cd8901218)

6 years agotravis: enable Travis CI on CentOS 7
Frantisek Sumsal [Mon, 7 Jan 2019 14:49:45 +0000 (15:49 +0100)] 
travis: enable Travis CI on CentOS 7

(cherry picked from commit 2014cb51b6dfe1f7f0b98e62311398c2bf801c2b)

6 years agocore: enforce a limit on STATUS= texts recvd from services
Lennart Poettering [Wed, 17 Oct 2018 16:37:48 +0000 (18:37 +0200)] 
core: enforce a limit on STATUS= texts recvd from services

Let's better be safe than sorry, and put a limit on what we receive.

(cherry picked from commit 3eac1bcae9284fb8b18f4b82156c0e85ddb004e5)

Related: CVE-2018-15686

6 years agocore: when deserializing state always use read_line(…, LONG_LINE_MAX, …)
Lennart Poettering [Wed, 17 Oct 2018 16:36:24 +0000 (18:36 +0200)] 
core: when deserializing state always use read_line(…, LONG_LINE_MAX, …)

This should be much better than fgets(), as we can read substantially
longer lines and overly long lines result in proper errors.

Fixes a vulnerability discovered by Jann Horn at Google.

CVE-2018-15686
LP: #1796402
https://bugzilla.redhat.com/show_bug.cgi?id=1639071

(cherry picked from commit 8948b3415d762245ebf5e19d80b97d4d8cc208c1)

Resolves: CVE-2018-15686

6 years agotests: drop the precondition check for inherited flag
Frantisek Sumsal [Thu, 8 Nov 2018 08:40:13 +0000 (09:40 +0100)] 
tests: drop the precondition check for inherited flag

Docker's default capability set has the inherited flag already
set - that breaks tests which expect otherwise. Let's just
drop the check and run the test anyway.

Fixes #10663

Cherry-picked from: c446b8486d9ed18d1bc780948ae9ee8a53fa4c3f

6 years agounit: don't add Requires for tmp.mount v239-11
Lukas Nykryn [Mon, 5 Sep 2016 10:47:09 +0000 (12:47 +0200)] 
unit: don't add Requires for tmp.mount

rhel-only
Resolves: #1619292

6 years agomeson: check whether gnutls supports TCP fast open
Yu Watanabe [Mon, 25 Jun 2018 13:40:40 +0000 (22:40 +0900)] 
meson: check whether gnutls supports TCP fast open

Fixes #9403

Cherry-picked from: f02582f69fe1e7663a87ba80bd4f90d5d23ee75f

6 years agomeson: rename -Ddebug to -Ddebug-extra
Zbigniew Jędrzejewski-Szmek [Sun, 19 Aug 2018 17:11:30 +0000 (19:11 +0200)] 
meson: rename -Ddebug to -Ddebug-extra

Meson added -Doptimization and -Ddebug options, which obviously causes
a conflict with our -Ddebug options. Let's rename it.

Fixes #9883.

Cherry-picked from: 8f6b442a78d0b485f044742ad90b2e8271b4e68e

6 years agotest: Drop SKIP_INITRD for QEMU-based tests
Michael Biebl [Mon, 16 Jul 2018 09:27:44 +0000 (11:27 +0200)] 
test: Drop SKIP_INITRD for QEMU-based tests

Not all distros support booting without an initrd. E.g. the Debian
kernel builds ext4 as a module and so relies on an initrd to
successfully start the QEMU-based images.

Cherry-picked from: c2d4da002095fe6f86f89a508a81e48fb6d3196f

6 years agonspawn: beef up netns checking a bit, for compat with old kernels
Lennart Poettering [Wed, 31 Oct 2018 12:04:20 +0000 (13:04 +0100)] 
nspawn: beef up netns checking a bit, for compat with old kernels

Fixes: #10544
Cherry-picked from: 6619ad889da260cf83079cc74a85d571acd1df5a

6 years agotests: explicitly enable user namespaces for TEST-13-NSPAWN-SMOKE
Frantisek Sumsal [Sat, 15 Dec 2018 19:22:31 +0000 (20:22 +0100)] 
tests: explicitly enable user namespaces for TEST-13-NSPAWN-SMOKE

Cherry-picked from: 67f5c0c776ce9449ad21e9854665573a05141fd4

6 years agosysctl.d: switch net.ipv4.conf.all.rp_filter from 1 to 2 v239-10
Lubomir Rintel [Wed, 28 Nov 2018 10:44:20 +0000 (11:44 +0100)] 
sysctl.d: switch net.ipv4.conf.all.rp_filter from 1 to 2

This switches the RFC3704 Reverse Path filtering from Strict mode to Loose
mode. The Strict mode breaks some pretty common and reasonable use cases,
such as keeping connections via one default route alive after another one
appears (e.g. plugging an Ethernet cable when connected via Wi-Fi).

The strict filter also makes it impossible for NetworkManager to do
connectivity check on a newly arriving default route (it starts with a
higher metric and is bumped lower if there's connectivity).

Kernel's default is 0 (no filter), but a Loose filter is good enough. The
few use cases where a Strict mode could make sense can easily override
this.

The distributions that don't care about the client use cases and prefer a
strict filter could just ship a custom configuration in
/usr/lib/sysctl.d/ to override this.

Cherry-picked from: 230450d4e4f1f5fc9fa4295ed9185eea5b6ea16e
Resolves: #1653824

6 years agorules: watch metadata changes on DASD devices
Vojtech Trefny [Tue, 4 Dec 2018 15:47:36 +0000 (16:47 +0100)] 
rules: watch metadata changes on DASD devices

To make sure the change event is emitted and udev db is updated
after metadata changes.

(cherry picked from commit 38397c8ce044fdc0138c9919168a856c0e16f720)

Resolves: #1638676

6 years agocryptsetup-generator: allow whitespace characters in keydev specification
Michal Sekletar [Tue, 4 Sep 2018 18:03:34 +0000 (20:03 +0200)] 
cryptsetup-generator: allow whitespace characters in keydev specification

For example, <luks.uuid>=/keyfile:LABEL="KEYFILE FS" previously wouldn't
work, because we truncated label at the first whitespace character,
i.e. LABEL="KEYFILE".

(cherry-picked from commit 7949dfa73a44ae6524779689483d12243dfbcfdf)

Related: #1656869

6 years agocryptsetup-generator: don't return error if target directory already exists
Michal Sekletar [Tue, 4 Sep 2018 17:51:14 +0000 (19:51 +0200)] 
cryptsetup-generator: don't return error if target directory already exists

(cherry-picked from commit 579875bc4a59b917fa32519e3d96d56dc591ad1e)

Related: #1656869

6 years agocryptsetup: don't use %m if there's no error to show
Lennart Poettering [Fri, 5 Oct 2018 20:37:37 +0000 (22:37 +0200)] 
cryptsetup: don't use %m if there's no error to show

We are not the ones receiving an error here, but the ones generating it,
hence we shouldn't show it with %m, that's just confusing, as it
suggests we received an error from some other call.

(cherry-picked from commit 2abe64666e544be6499f870618185f8819b4c152)

Related: #1656869

6 years agocryptsetup-generator: introduce basic keydev support
Michal Sekletar [Thu, 30 Aug 2018 08:45:11 +0000 (08:45 +0000)] 
cryptsetup-generator: introduce basic keydev support

Dracut has a support for unlocking encrypted drives with keyfile stored
on the external drive. This support is included in the generated initrd
only if systemd module is not included.

When systemd is used in initrd then attachment of encrypted drives is
handled by systemd-cryptsetup tools. Our generator has support for
keyfile, however, it didn't support keyfile on the external block
device (keydev).

This commit introduces basic keydev support. Keydev can be specified per
luks.uuid on the kernel command line. Keydev is automatically mounted
during boot and we look for keyfile in the keydev
mountpoint (i.e. keyfile path is prefixed with the keydev mount point
path). After crypt device is attached we automatically unmount
where keyfile resides.

Example:
        rd.luks.key=70bc876b-f627-4038-9049-3080d79d2165=/key:LABEL=KEYDEV

(cherry-picked from commit 70f5f48eb891b12e969577b464de61e15a2593da)

Resolves: #1656869

6 years agosd-bus: properly initialize containers v239-9
Jan Synacek [Wed, 31 Oct 2018 11:50:19 +0000 (12:50 +0100)] 
sd-bus: properly initialize containers

Fixes a SIGSEGV introduced by commit 38a5315a3a6fab745d8c86ff9e486faaf50b28d1.
The same problem doesn't exist upstream, as the container structure
there is initialized using a compound literal, which is zeroed out by
default.

Related: #1635435

6 years agosd-bus: unify three code-paths which free struct bus_container
Zbigniew Jędrzejewski-Szmek [Mon, 9 Jul 2018 06:06:28 +0000 (08:06 +0200)] 
sd-bus: unify three code-paths which free struct bus_container

We didn't free one of the fields in two of the places.

$ valgrind --show-leak-kinds=all --leak-check=full \
  build/fuzz-bus-message \
  test/fuzz/fuzz-bus-message/leak-c09c0e2256d43bc5e2d02748c8d8760e7bc25d20
...
==14457== HEAP SUMMARY:
==14457==     in use at exit: 3 bytes in 1 blocks
==14457==   total heap usage: 509 allocs, 508 frees, 51,016 bytes allocated
==14457==
==14457== 3 bytes in 1 blocks are definitely lost in loss record 1 of 1
==14457==    at 0x4C2EBAB: malloc (vg_replace_malloc.c:299)
==14457==    by 0x53AFE79: strndup (in /usr/lib64/libc-2.27.so)
==14457==    by 0x4F52EB8: free_and_strndup (string-util.c:1039)
==14457==    by 0x4F8E1AB: sd_bus_message_peek_type (bus-message.c:4193)
==14457==    by 0x4F76CB5: bus_message_dump (bus-dump.c:144)
==14457==    by 0x108F12: LLVMFuzzerTestOneInput (fuzz-bus-message.c:24)
==14457==    by 0x1090F7: main (fuzz-main.c:34)
==14457==
==14457== LEAK SUMMARY:
==14457==    definitely lost: 3 bytes in 1 blocks

(cherry picked from commit 6d1e0f4fcba8d6f425da3dc91805db95399b3c8b)
Resolves: #1635435

6 years agodetect-virt: do not try to read all of /proc/cpuinfo
Zbigniew Jędrzejewski-Szmek [Thu, 13 Sep 2018 07:24:36 +0000 (09:24 +0200)] 
detect-virt: do not try to read all of /proc/cpuinfo

Quoting https://github.com/systemd/systemd/issues/10074:
> detect_vm_uml() reads /proc/cpuinfo with read_full_file()
> read_full_file() has a file max limit size of READ_FULL_BYTES_MAX=(4U*1024U*1024U)
> Unfortunately, the size of my /proc/cpuinfo is bigger, approximately:
> echo $(( 4* $(cat /proc/cpuinfo | wc -c)))
9918072
> This causes read_full_file() to fail and the Condition test fallout.

Let's just read line by line until we find an intersting line. This also
helps if not running under UML, because we avoid reading as much data.

(cherry picked from commit 6058516a14ada1748313af6783f5b4e7e3006654)

Resolves: #1631532

6 years agoRevert "sysctl.d: request ECN on both in and outgoing connections"
Thomas Hindoe Paaboel Andersen [Fri, 17 Aug 2018 19:31:05 +0000 (21:31 +0200)] 
Revert "sysctl.d: request ECN on both in and outgoing connections"

Turning on ECN still causes slow or broken network on linux. Our tcp
is not yet ready for wide spread use of ECN.

This reverts commit 919472741dba6ad0a3f6c2b76d390a02d0e2fdc3.

(cherry picked from commit 1e190dfd5bb95036f937ef1dc46f43eb0a146612)

Resolves: #1619790

6 years agotest: add test case for recursive chown()ing
Lennart Poettering [Fri, 19 Oct 2018 09:31:37 +0000 (11:31 +0200)] 
test: add test case for recursive chown()ing

[msekleta: I removed call to log_test_skipped() and replaced it with older construct log_info() + return EXIT_TEST_SKIP]

(cherry-picked from commit cb9e44db36caefcbb8ee7a12e14217305ed69ff2)

Related: #1643368

6 years agochown-recursive: TAKE_FD() is your friend
Lennart Poettering [Fri, 19 Oct 2018 09:42:11 +0000 (11:42 +0200)] 
chown-recursive: TAKE_FD() is your friend

(cherry-picked from commit cd6b7d50c337b3676a3d5fc2188ff298dcbdb939)

Related: #1643368

6 years agochown-recursive: also drop ACLs when recursively chown()ing
Lennart Poettering [Fri, 19 Oct 2018 09:28:40 +0000 (11:28 +0200)] 
chown-recursive: also drop ACLs when recursively chown()ing

Let's better be safe than sorry and also drop ACLs.

(cherry-picked from commit f89bc84f3242449cbc308892c87573b131f121df)

Related: #1643368

6 years agochown-recursive: let's rework the recursive logic to use O_PATH
Lennart Poettering [Fri, 19 Oct 2018 09:26:59 +0000 (11:26 +0200)] 
chown-recursive: let's rework the recursive logic to use O_PATH

That way we can pin a specific inode and analyze it and manipulate it
without it being swapped out beneath our hands.

Fixes a vulnerability originally found by Jann Horn from Google.

CVE-2018-15687
LP: #1796692
https://bugzilla.redhat.com/show_bug.cgi?id=1639076

(cherry-picked from commit 5de6cce58b3e8b79239b6e83653459d91af6e57c)

Resolves: #1643368

6 years agodebug-generator: introduce rd.* version of all options
Lukas Nykryn [Thu, 25 Oct 2018 14:34:00 +0000 (16:34 +0200)] 
debug-generator: introduce rd.* version of all options

(cherry picked from commit a7dd6d04b07f58df5c0294743d76df0be0b4b928)

Resolves: #1643429

6 years agoproc-cmdline: introduce PROC_CMDLINE_RD_STRICT
Lukas Nykryn [Thu, 25 Oct 2018 14:21:26 +0000 (16:21 +0200)] 
proc-cmdline: introduce PROC_CMDLINE_RD_STRICT

Our current set of flags allows an option to be either
use just in initrd or both in initrd and normal system.
This new flag is intended to be used in the case where
you want apply some settings just in initrd or just
in normal system.

(cherry picked from commit ed58820d7669971762dd887dc117d922c23f2543)

Related: #1643429

6 years agocore: make sure we don't throttle change signal generator when a reload is pending
Lennart Poettering [Tue, 13 Nov 2018 11:48:49 +0000 (12:48 +0100)] 
core: make sure we don't throttle change signal generator when a reload is pending

Fixes: #10627
(cherry picked from commit b8d381c47776ea0440af175cbe0c02cb743bde08)

Resolves: #1647359

6 years agocore: when we can't send the pending reload message, say we ignore it in the warning...
Lennart Poettering [Tue, 13 Nov 2018 11:00:42 +0000 (12:00 +0100)] 
core: when we can't send the pending reload message, say we ignore it in the warning we log

No change in behaviour, just better wording.

(cherry picked from commit 4b66bccab004221b903b43b4c224442bfa3e9ac7)

Resolves: #1647359

6 years agocore: rename queued_message → pending_reload_message
Lennart Poettering [Tue, 13 Nov 2018 10:59:06 +0000 (11:59 +0100)] 
core: rename queued_message → pending_reload_message

This field is only used for pending Reload() replies, hence let's rename
it to be more descriptive and precise.

No change in behaviour.

(cherry picked from commit 209de5256b7ba8600c3e73a85a43b86708998d65)

Resolves: #1647359

6 years agodhcp6: make sure we have enough space for the DHCP6 option header
Lennart Poettering [Fri, 19 Oct 2018 10:12:33 +0000 (12:12 +0200)] 
dhcp6: make sure we have enough space for the DHCP6 option header

Fixes a vulnerability originally discovered by Felix Wilhelm from
Google.

CVE-2018-15688
LP: #1795921
https://bugzilla.redhat.com/show_bug.cgi?id=1639067

(cherry-picked from commit 4dac5eaba4e419b29c97da38a8b1f82336c2c892)

Resolves: #1643363

7 years agojournal-file: avoid calling ftruncate with invalid fd
David Tardon [Wed, 10 Oct 2018 11:56:54 +0000 (13:56 +0200)] 
journal-file: avoid calling ftruncate with invalid fd

This can happen if journal_file_close is called from the failure
handling code of journal_file_open before f->fd was established.

(cherry picked from commit c52368509f48e556be5a4c7a171361b656a25e02)

Resolves: #1602706

7 years agofirewall-util: add an assert that we're not overwriting a buffer
David Tardon [Wed, 10 Oct 2018 07:33:28 +0000 (09:33 +0200)] 
firewall-util: add an assert that we're not overwriting a buffer

... like commit f28501279d2c28fdbb31d8273b723e9bf71d3b98 does for
out_interface.

(cherry picked from commit 0b777d20e9a3868b12372ffce8040d1be063cec7)

Resolves: #1602706

7 years agologin: avoid leak of name returned by uid_to_name()
David Tardon [Tue, 9 Oct 2018 15:26:19 +0000 (17:26 +0200)] 
login: avoid leak of name returned by uid_to_name()

(cherry picked from commit e99742ef3e9d847da04e71fec0eb426063b25068)

Resolves: #1602706

7 years agodissect-image: use right comparison function
David Tardon [Tue, 9 Oct 2018 11:50:55 +0000 (13:50 +0200)] 
dissect-image: use right comparison function

fstype can be NULL here.

(cherry picked from commit 4db1879acdc0b853e1a7e6e650b6feb917175fac)

Resolves: #1602706

7 years agoresolved: create /etc/resolv.conf symlink at runtime v239-8
Zbigniew Jędrzejewski-Szmek [Fri, 11 Mar 2016 22:06:17 +0000 (17:06 -0500)] 
resolved: create /etc/resolv.conf symlink at runtime

If the symlink doesn't exists, and we are being started, let's
create it to provie name resolution.

If it exists, do nothing. In particular, if it is a broken symlink,
we cannot really know if the administator configured it to point to
a location used by some service that hasn't started yet, so we
don't touch it in that case either.

https://bugzilla.redhat.com/show_bug.cgi?id=1313085

7 years agojournal: change support URL shown in the catalog entries
Michal Sekletar [Mon, 15 Oct 2018 10:55:50 +0000 (10:55 +0000)] 
journal: change support URL shown in the catalog entries

Resolves: #1550548

7 years agotests: backport test_setup_logging()
Michal Sekletar [Mon, 15 Oct 2018 10:54:11 +0000 (10:54 +0000)] 
tests: backport test_setup_logging()

Related: #1635428

7 years agoIntroduce free_and_strndup and use it in bus-message.c
Zbigniew Jędrzejewski-Szmek [Mon, 9 Jul 2018 05:03:01 +0000 (07:03 +0200)] 
Introduce free_and_strndup and use it in bus-message.c

v2: fix error in free_and_strndup()

When the orignal and copied message were the same, but shorter than specified
length l, memory read past the end of the buffer would be performed. A test
case is included: a string that had an embedded NUL ("q\0") is used to replace
"q".

v3: Fix one more bug in free_and_strndup and add tests.

v4: Some style fixed based on review, one more use of free_and_replace, and
make the tests more comprehensive.

(cherry picked from commit 7f546026abbdc56c453a577e52d57159458c3e9c)

Resolves: #1635428

7 years agobus-message: do not crash on message with a string of zero length
Zbigniew Jędrzejewski-Szmek [Mon, 9 Jul 2018 11:21:44 +0000 (13:21 +0200)] 
bus-message: do not crash on message with a string of zero length

We'd calculate the "real" length of the string as 'item_size - 1', which does
not work out well when item_size == 0.

(cherry picked from commit 81b6e63029eefcb0ec03a3a7c248490e38106073)

Resolves: #1635439

7 years agounits: don't enable per-service IP firewall by default
Michal Sekletar [Fri, 12 Oct 2018 14:50:09 +0000 (14:50 +0000)] 
units: don't enable per-service IP firewall by default

Resolves: #1630219

7 years agocryptsetup: do not define arg_sector_size if libgcrypt is v1.x (#9990)
Yu Watanabe [Sat, 1 Sep 2018 14:47:46 +0000 (23:47 +0900)] 
cryptsetup: do not define arg_sector_size if libgcrypt is v1.x (#9990)

Follow-up for #9936.

(cherry picked from commit 645461f0cf6ec91e5b0b571559fb4cc4898192bc)

Related: #1572563

7 years agocryptsetup: add support for sector-size= option (#9936)
Dimitri John Ledkov [Wed, 29 Aug 2018 14:38:09 +0000 (15:38 +0100)] 
cryptsetup: add support for sector-size= option (#9936)

Bug-Ubuntu: https://launchpad.net/bugs/1776626

Closes #8881.

(cherry picked from commit a9fc640671ef60ac949f1ace6fa687ff242fc233)

Resolves: #1572563

7 years agorandom-seed: raise POOL_SIZE_MIN constant to 1024
Michal Sekletar [Fri, 12 Oct 2018 13:58:34 +0000 (13:58 +0000)] 
random-seed: raise POOL_SIZE_MIN constant to 1024

Resolves: #1619268

7 years agobus: move BUS_DONT_DESTROY calls after asserts
Zbigniew Jędrzejewski-Szmek [Wed, 18 Jul 2018 10:16:33 +0000 (12:16 +0200)] 
bus: move BUS_DONT_DESTROY calls after asserts

It's not useful to bump the reference count before checking if the object is
NULL. Thanks to d40f5cc498 we can do this ;).

Related to https://bugzilla.redhat.com/show_bug.cgi?id=1576084,
https://bugzilla.redhat.com/show_bug.cgi?id=1575340,
https://bugzilla.redhat.com/show_bug.cgi?id=1575350. I'm not sure why those two
people hit this code path, while most people don't. At least we won't abort.

(cherry picked from commit 7ae8edcd03f74da123298330b76c3fc5425042ef)

Resolves: #1610397

7 years agojournal: remove journal audit socket
Michal Sekletar [Thu, 9 Aug 2018 21:23:00 +0000 (23:23 +0200)] 
journal: remove journal audit socket

Resolves: #1614554

7 years agounits: drop DynamicUser=yes from systemd-resolved.service
Michal Sekletar [Thu, 9 Aug 2018 13:28:44 +0000 (15:28 +0200)] 
units: drop DynamicUser=yes from systemd-resolved.service

We don't really need DynamicUser since we add systemd-resolve user
from rpm script

7 years agonet_setup_link: allow renaming interfaces that were renamed previously
Michal Sekletar [Tue, 7 Aug 2018 08:38:33 +0000 (10:38 +0200)] 
net_setup_link: allow renaming interfaces that were renamed previously

7 years agoRevert "udev: remove WAIT_FOR key"
Michal Sekletar [Thu, 2 Aug 2018 11:16:49 +0000 (13:16 +0200)] 
Revert "udev: remove WAIT_FOR key"

This reverts commit f2b8052fb648b788936dd3e85be6a9aca90fbb2f.

Resolves: #1523213

7 years agorules: introduce old-style by-path symlinks for FCP based SCSI devices
Michal Sekletar [Wed, 28 Mar 2018 15:22:30 +0000 (17:22 +0200)] 
rules: introduce old-style by-path symlinks for FCP based SCSI devices

Related: #1523227

7 years agorules: disable auto-online of hot-plugged memory on IBM z Systems
Michal Sekletar [Fri, 16 Sep 2016 12:45:01 +0000 (14:45 +0200)] 
rules: disable auto-online of hot-plugged memory on IBM z Systems

Related: #1523227

7 years agorules: don't hoplug memory on s390x
Lukas Nykryn [Tue, 13 Sep 2016 11:18:38 +0000 (13:18 +0200)] 
rules: don't hoplug memory on s390x

Related: #1523227

7 years agorules: load sg driver also when scsi_target appears (#45)
Lukáš Nykrýn [Thu, 18 Aug 2016 12:51:19 +0000 (14:51 +0200)] 
rules: load sg driver also when scsi_target appears (#45)

Related: #1523227