b26fa1a2fbcfee7d03b0c8fd15ec3aa64ae70b9f |
|
10-Feb-2016 |
Daniel Mack <daniel@zonque.org> |
tree-wide: remove Emacs lines from all files
This should be handled fine now by .dir-locals.el, so need to carry that
stuff in every file. |
cab2aca3e7dc9966eb9f45416f34729719f01dd4 |
|
01-Feb-2016 |
Lennart Poettering <lennart@poettering.net> |
core: fix support for transient resource limit properties
Make sure we can properly process resource limit properties. Specifically, allow transient configuration of both the
soft and hard limit, the same way from the unit files. Previously, only the the hard rlimits could be configured but
they'd implicitly spill into the soft hard rlimits.
This also updates the client-side code to be able to parse hard/soft resource limit specifications. Since we need to
serialize two properties in bus_append_unit_property_assignment() now, the marshalling of the container around it is
now moved into the function itself. This has the benefit of shortening the calling code.
As a side effect this now beefs up the rlimit parser of "systemctl set-property" to understand time and disk sizes
where that's appropriate. |
cb51e6b73439271eba6d9f1715fedb2305a04518 |
|
18-Jan-2016 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
core/dbus-execute: do not needlessly compare strings again
gcc complains that dirs might be unitialized. It cannot, but
we just checked that name has one of three values above, so
no need to check again. |
b3267152783d5784c45010615045d4e8ee459da2 |
|
13-Jan-2016 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
tree-wide: check if errno is greater than zero (2)
Compare errno with zero in a way that tells gcc that
(if the condition is true) errno is positive. |
755d4b67a471ed1a3472b8536cb51315d4e4e3c1 |
|
11-Jan-2016 |
Ismo Puustinen <ismo.puustinen@intel.com> |
capabilities: added support for ambient capabilities.
This patch adds support for ambient capabilities in service files. The
idea with ambient capabilities is that the execed processes can run with
non-root user and get some inherited capabilities, without having any
need to add the capabilities to the executable file.
You need at least Linux 4.3 to use ambient capabilities. SecureBit
keep-caps is automatically added when you use ambient capabilities and
wish to change the user.
An example system service file might look like this:
[Unit]
Description=Service for testing caps
[Service]
ExecStart=/usr/bin/sleep 10000
User=nobody
AmbientCapabilities=CAP_NET_ADMIN CAP_NET_RAW
After starting the service it has these capabilities:
CapInh: 0000000000003000
CapPrm: 0000000000003000
CapEff: 0000000000003000
CapBnd: 0000003fffffffff
CapAmb: 0000000000003000 |
a103496ca585e22bb5e386e3238b468d133f5659 |
|
11-Jan-2016 |
Ismo Puustinen <ismo.puustinen@intel.com> |
capabilities: keep bounding set in non-inverted format.
Change the capability bounding set parser and logic so that the bounding
set is kept as a positive set internally. This means that the set
reflects those capabilities that we want to keep instead of drop. |
147f6858abb7b177f28a536caff89e0a6be214c5 |
|
30-Nov-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
core: expose soft limits on the bus
This is a follow-up for https://github.com/systemd/systemd/pull/1994
See https://github.com/systemd/systemd/pull/1994#issuecomment-160087219 |
b4c14404b3e8753c41bac0b1d49369230a15c544 |
|
11-Nov-2015 |
Filipe Brandenburger <filbranden@google.com> |
execute: Add new PassEnvironment= directive
This directive allows passing environment variables from the system
manager to spawned services. Variables in the system manager can be set
inside a container by passing `--set-env=...` options to systemd-spawn.
Tested with an on-disk test.service unit. Tested using multiple variable
names on a single line, with an empty setting to clear the current list
of variables, with non-existing variables.
Tested using `systemd-run -p PassEnvironment=VARNAME` to confirm it
works with transient units.
Confirmed that `systemctl show` will display the PassEnvironment
settings.
Checked that man pages are generated correctly.
No regressions in `make check`. |
7b3e062cb6872e28ef5a2e069810070e28bbe0cd |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
process-util: move a couple of process-related calls over |
b5efdb8af40ea759a1ea584c1bc44ecc81dd00ce |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split out allocation calls into alloc-util.[ch] |
7ccbd1ae843d77275f2c542582a9a80e5e058a70 |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split out syslog-related calls into syslog-util.[ch] |
430f0182b72373145c839dbfe99d2382855cb8f8 |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
src/basic: rename audit.[ch] → audit-util.[ch] and capability.[ch] → capability-util.[ch]
The files are named too generically, so that they might conflict with
the upstream project headers. Hence, let's add a "-util" suffix, to
clarify that this are just our utility headers and not any official
upstream headers. |
78f22b973fa2c9b09bd974680836df17163d9ee0 |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split out resource limits related calls into rlimit-util.[ch] |
e4e73a632524c382139034d4271f53b6089ab4cb |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split out hex/dec/oct encoding/decoding into its own file |
6bedfcbb2970e06a4d3280c8fb62083d252ede73 |
|
27-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split string parsing related calls from util.[ch] into parse-util.[ch] |
fa21b5e3d763412226beefba8443011581be79eb |
|
27-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with RuntimeDirectory |
eff580744c339432889fd612d9f46fcbde818bd4 |
|
26-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with ProtectHome |
3ffd4af22052963e7a29431721ee204e634bea75 |
|
25-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
util-lib: split out fd-related operations into fd-util.[ch]
There are more than enough to deserve their own .c file, hence move them
over. |
5664e6cf463920a3365a891f07bad98207ff5aab |
|
25-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with ProtectSystem |
b0830e21f47109d8a6ba2fc0afbf9b2ca1ffc2a9 |
|
22-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
core: check parsed bus msg in full before applying it |
08596068d74caa890b3fe460b0ce123883b9d330 |
|
21-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with ReadWriteDirectories, ReadOnlyDirectories, InaccessibleDirectories |
9ecc70db1e2e3240c622403eaf9540880be89716 |
|
20-Oct-2015 |
Thomas Hindoe Paaboel Andersen <phomes@gmail.com> |
dbus-execute: remove unused variable
from ceb728cf |
e9876fc9c5aeec0144c15cd288852ea6c6ac8c29 |
|
20-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: fix Environment parsing
* `Environment=` resets previous assignments
* `Environment='a=1 b=2'` sets `a` to `1` and `b` to `2`
* `Environment='"a=1 2" b=2"'` sets `a` to `1 2` and `b` to `2` |
2229f656677f0d50c507aec40cda59f66da5c949 |
|
19-Oct-2015 |
Lennart Poettering <lennart@poettering.net> |
dbus-execute: some cleanups when parsing EnvironmentFiles= for transient units |
ceb728cf0fdfb6543f40b862525319a084332dfc |
|
19-Oct-2015 |
Nicolas Cornu <ncornu@aldebaran.com> |
Hook more properties for transient units
systemd-run can now launch units with EnvironmentFile set. |
6b862936c7c1a55a886e55c247b8fd3b5f41bdfd |
|
17-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with OOMScoreAdjust |
f1db33275635c77ee01132a27235d4bc362f9d4a |
|
15-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
run: can launch units with TimerSlackNSec |
e0d6e0fa55054b7eacf58c511abff710fef5712f |
|
14-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
core: execute: validate syslog level and facility |
460ed929cf2081e5a445b9e8fedbbaf0da7eff44 |
|
14-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
systemd-run: can launch units with SyslogFacility |
a8a1357560aa6b2618dfe65674c9c9179940ef88 |
|
14-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
systemd-run: can launch units with SyslogLevel |
06f2ccf949efd111d298302b632be8a085dea26b |
|
14-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
core: expose SyslogLevel and SyslogFacility as properties on dbus |
c9d031c353177420809b2e187f0392ad9ba8362a |
|
12-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
bus-util: add bus_property_get_rlimit (move from core/dbus_execute) |
de53c4174886898410fdce7eb7551a6a1ed19655 |
|
09-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
systemd-run can now launch units with SyslogIdentifier |
047d99337f2e32cf6fc88bf415d4a3ed2a286539 |
|
09-Oct-2015 |
Evgeny Vereshchagin <evvers@ya.ru> |
systemd-run can now launch units with SyslogLevelPrefix |
5f5d8eab1f2f5f5e088bc301533b3e4636de96c7 |
|
29-Sep-2015 |
Lennart Poettering <lennart@poettering.net> |
core: allow setting WorkingDirectory= to the special value ~
If set to ~ the working directory is set to the home directory of the
user configured in User=.
This change also exposes the existing switch for the working directory
that allowed making missing working directories non-fatal.
This also changes "machinectl shell" to make use of this to ensure that
the invoked shell is by default in the user's home directory.
Fixes #1268. |
602b83559a7cfcd3eee05bbdb5518830752a2667 |
|
23-Sep-2015 |
Nicolas Cornu <ncornu@aldebaran.com> |
Hook more properties for transient units
systemd-run can now launch units with WorkingDirectory, RootDirectory set. |
b9c50073fcc1460ca1ff309189f26a1c0c5fc884 |
|
11-Sep-2015 |
Gabriel de Perthuis <g2p.code@gmail.com> |
Hook more properties for transient units
systemd-run can now launch units with PrivateTmp, PrivateDevices,
PrivateNetwork, NoNewPrivileges set. |
a1e58e8ee1c84b633d6d6d651d5328d4dd4eba5b |
|
09-Sep-2015 |
Lennart Poettering <lennart@poettering.net> |
tree-wide: use coccinelle to patch a lot of code to use mfree()
This replaces this:
free(p);
p = NULL;
by this:
p = mfree(p);
Change generated using coccinelle. Semantic patch is added to the
sources. |
7e9cc4361d3846d7fc3efc79ff7183df1dc588c8 |
|
25-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
core: drop spurious new line |
506711fddd432aff2aacadfe0e43b0ff5411b106 |
|
24-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
core: open up more executable properties via the bus
This is preparation for a later commit that makes use of these
properties for spawning an interactive shell in a container. |
023a4f67011f24d4b085995a4a3a02661c4794a2 |
|
24-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
core: optionally create LOGIN_PROCESS or USER_PROCESS utmp entries
When generating utmp/wtmp entries, optionally add both LOGIN_PROCESS and
INIT_PROCESS entries or even all three of LOGIN_PROCESS, INIT_PROCESS
and USER_PROCESS entries, instead of just a single INIT_PROCESS entry.
With this change systemd may be used to not only invoke a getty directly
in a SysV-compliant way but alternatively also a login(1) implementation
or even forego getty and login entirely, and invoke arbitrary shells in
a way that they appear in who(1) or w(1).
This is preparation for a later commit that adds a "machinectl shell"
operation to invoke a shell in a container, in a way that is compatible
with who(1) and w(1). |
9b15b7846d4de01bb5d9700a24077787e984e8ab |
|
23-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
run: add a new "-t" mode for invoking a binary on an allocated TTY |
2ca620c4ed28c01f285d869d0b22f22a360957da |
|
24-Nov-2014 |
WaLyong Cho <walyong.cho@samsung.com> |
smack: introduce new SmackProcessLabel option
In service file, if the file has some of special SMACK label in
ExecStart= and systemd has no permission for the special SMACK label
then permission error will occurred. To resolve this, systemd should
be able to set its SMACK label to something accessible of ExecStart=.
So introduce new SmackProcessLabel. If label is specified with
SmackProcessLabel= then the child systemd will set its label to
that. To successfully execute the ExecStart=, accessible label should
be specified with SmackProcessLabel=.
Additionally, by SMACK policy, if the file in ExecStart= has no
SMACK64EXEC then the executed process will have given label by
SmackProcessLabel=. But if the file has SMACK64EXEC then the
SMACK64EXEC label will be overridden.
[zj: reword man page] |
3a43da2832dc5360a638d043f469a6dcbe025582 |
|
29-Jul-2014 |
Kay Sievers <kay@vrfy.org> |
time-util: add and use USEC/NSEC_INFINIY |
cdd7b7dfd44649b204c43e907f03d4294de4f28a |
|
23-Jun-2014 |
Hristo Venev <mustrumr97@gmail.com> |
core: make sure Environment fields passed in for transient units are properly written to unit files
https://bugs.freedesktop.org/show_bug.cgi?id=76744 |
1b8689f94983b47bf190e77ddb03a8fc6af15fb3 |
|
04-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
core: rename ReadOnlySystem= to ProtectSystem= and add a third value for also mounting /etc read-only
Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit.
With this in place we now have two neat options ProtectSystem= and
ProtectHome= for protecting the OS itself (and optionally its
configuration), and for protecting the user's data. |
417116f23432073162ebfcb286a7800846482eed |
|
03-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
core: add new ReadOnlySystem= and ProtectedHome= settings for service units
ReadOnlySystem= uses fs namespaces to mount /usr and /boot read-only for
a service.
ProtectedHome= uses fs namespaces to mount /home and /run/user
inaccessible or read-only for a service.
This patch also enables these settings for all our long-running services.
Together they should be good building block for a minimal service
sandbox, removing the ability for services to modify the operating
system or access the user's private data. |
7f8aa67131cfc03ddcbd31c0420754864fc122f0 |
|
24-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
core: remove tcpwrap support
tcpwrap is legacy code, that is barely maintained upstream. It's APIs
are awful, and the feature set it exposes (such as DNS and IDENT
access control) questionnable. We should not support this natively in
systemd.
Hence, let's remove the code. If people want to continue making use of
this, they can do so by plugging in "tcpd" for the processes they start.
With that scheme things are as well or badly supported as they were from
traditional inetd, hence no functionality is really lost. |
d584f638940366c46a48e34a25cf43e2b77475be |
|
05-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
core: make the LimitXYZ= properties settable for transient service units |
a049d1a9723b6608e45bf8f1a64dab5761dee555 |
|
05-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
core: when passing resource limit values to client, map RLIM_INFINITY into portable value (uint64_t) -1 |
6e18964d3a365567954fe10ddcfad74babdc427c |
|
04-Mar-2014 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
Introduce strv_consume which takes ownership
This mirrors set_consume and makes the common use a bit nicer. |
e66cf1a3f94fff48a572f6dbd19b43c9bcf7b8c7 |
|
03-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
core: introduce new RuntimeDirectory= and RuntimeDirectoryMode= unit settings
As discussed on the ML these are useful to manage runtime directories
below /run for services. |
4298d0b5128326621c8f537107c4c8b459490721 |
|
26-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: add new RestrictAddressFamilies= switch
This new unit settings allows restricting which address families are
available to processes. This is an effective way to minimize the attack
surface of services, by turning off entire network stacks for them.
This is based on seccomp, and does not work on x86-32, since seccomp
cannot filter socketcall() syscalls on that platform. |
eef65bf3ee6f73afa4a5de23ae3a794a279f30c0 |
|
21-Feb-2014 |
Michael Scherer <misc@zarb.org> |
core: Add AppArmor profile switching
This permit to switch to a specific apparmor profile when starting a daemon. This
will result in a non operation if apparmor is disabled.
It also add a new build requirement on libapparmor for using this feature. |
ac45f971a12280de55b834a65237f72dcacfc099 |
|
19-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: add Personality= option for units to set the personality for spawned processes |
5f8640fb628cb034981e02d741fd9ddf26fdf38d |
|
17-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: store and expose SELinuxContext field normalized as bool + string |
57183d117a1d6a96d71ce99d648beb0d2b36228d |
|
13-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: add SystemCallArchitectures= unit setting to allow disabling of non-native
architecture support for system calls
Also, turn system call filter bus properties into complex types instead
of concatenated strings. |
351a19b17d51ba0a5737f35d3c5deb8e7975fdee |
|
12-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: fix build without libseccomp |
17df7223be064b1542dbe868e3b35cca977ee639 |
|
12-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: rework syscall filter
- Allow configuration of an errno error to return from blacklisted
syscalls, instead of immediately terminating a process.
- Fix parsing logic when libseccomp support is turned off
- Only keep the actual syscall set in the ExecContext, and generate the
string version only on demand. |
c0467cf387548dc98c0254f63553d862b35a84e5 |
|
12-Feb-2014 |
Ronny Chevalier <chevalier.ronny@gmail.com> |
syscallfilter: port to libseccomp |
7b52a628f8b43ba521c302a7f32bccf9d0dc8bfd |
|
10-Feb-2014 |
Michael Scherer <misc@zarb.org> |
exec: Add SELinuxContext configuration item
This permit to let system administrators decide of the domain of a service.
This can be used with templated units to have each service in a différent
domain ( for example, a per customer database, using MLS or anything ),
or can be used to force a non selinux enabled system (jvm, erlang, etc)
to start in a different domain for each service. |
1006a62d20855eb7d70b044031a2a676a8111a0f |
|
07-Feb-2014 |
Thomas Hindoe Paaboel Andersen <phomes@gmail.com> |
core: fix warning
introduced in c7040b5d1c2c148f12b6a5eef3dfce1661805131 |
c7040b5d1c2c148f12b6a5eef3dfce1661805131 |
|
05-Feb-2014 |
Lennart Poettering <lennart@poettering.net> |
core: allow User=, Group=, Nice=, Environment=, Type= to be passed when creating a transient service |
7f112f50fea585411ea2d493b3582bea77eb4d6e |
|
20-Jan-2014 |
Lennart Poettering <lennart@poettering.net> |
exec: introduce PrivateDevices= switch to provide services with a private /dev
Similar to PrivateNetwork=, PrivateTmp= introduce PrivateDevices= that
sets up a private /dev with only the API pseudo-devices like /dev/null,
/dev/zero, /dev/random, but not any physical devices in them. |
5ce70e5bcd62e89b52485961c3699312ee4a7e0e |
|
03-Jan-2014 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
Introduce cleanup functions for cap_free
Unfortunately a different cleanup function is necessary per type,
because cap_t** and char** are incompatible with void**. |
556089dc57b10a12a03edd3d3e90ca17398ad206 |
|
22-Dec-2013 |
Lennart Poettering <lennart@poettering.net> |
bus: decorate the various object vtables with SD_BUS_VTABLE_PROPERTY_CONST where appropriate |
4d4c80d073f26368d123f8cebff5b4c36a6beace |
|
25-Nov-2013 |
Lennart Poettering <lennart@poettering.net> |
core: fix serialization of exec command structs |
ebcf1f97de4f6b1580ae55eb56b1a3939fe6b602 |
|
21-Nov-2013 |
Lennart Poettering <lennart@poettering.net> |
bus: rework message handlers to always take an error argument
Message handler callbacks can be simplified drastically if the
dispatcher automatically replies to method calls if errors are returned.
Thus: add an sd_bus_error argument to all message handlers. When we
dispatch a message handler and it returns negative or a set sd_bus_error
we send this as message error back to the client. This means errors
returned by handlers by default are given back to clients instead of
rippling all the way up to the event loop, which is desirable to make
things robust.
As a side-effect we can now easily turn the SELinux checks into normal
function calls, since the method call dispatcher will generate the right
error replies automatically now.
Also, make sure we always pass the error structure to all property and
method handlers as last argument to follow the usual style of passing
variables for return values as last argument. |
718db96199eb307751264e4163555662c9a389fa |
|
20-Nov-2013 |
Lennart Poettering <lennart@poettering.net> |
core: convert PID 1 to libsystemd-bus
This patch converts PID 1 to libsystemd-bus and thus drops the
dependency on libdbus. The only remaining code using libdbus is a test
case that validates our bus marshalling against libdbus' marshalling,
and this dependency can be turned off.
This patch also adds a couple of things to libsystem-bus, that are
necessary to make the port work:
- Synthesizing of "Disconnected" messages when bus connections are
severed.
- Support for attaching multiple vtables for the same interface on the
same path.
This patch also fixes the SetDefaultTarget() and GetDefaultTarget() bus
calls which used an inappropriate signature.
As a side effect we will now generate PropertiesChanged messages which
carry property contents, rather than just invalidation information. |
68eda4bd168306f51c90e5d22824c494d709289e |
|
08-Aug-2013 |
Ronny Chevalier <rchevalier@aldebaran-robotics.com> |
dbus: use _cleanup_free_ instead of freeing ourself |
4ad490007b70e6ac18d3cb04fa2ed92eba1451fa |
|
27-Jun-2013 |
Lennart Poettering <lennart@poettering.net> |
core: general cgroup rework
Replace the very generic cgroup hookup with a much simpler one. With
this change only the high-level cgroup settings remain, the ability to
set arbitrary cgroup attributes is removed, so is support for adding
units to arbitrary cgroup controllers or setting arbitrary paths for
them (especially paths that are different for the various controllers).
This also introduces a new -.slice root slice, that is the parent of
system.slice and friends. This enables easy admin configuration of
root-level cgrouo properties.
This replaces DeviceDeny= by DevicePolicy=, and implicitly adds in
/dev/null, /dev/zero and friends if DeviceAllow= is used (unless this is
turned off by DevicePolicy=). |
b92bea5d2a9481de69bb627a7b442a9f58fca43d |
|
06-Apr-2013 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
Use initalization instead of explicit zeroing
Before, we would initialize many fields twice: first
by filling the structure with zeros, and then a second
time with the real values. We can let the compiler do
the job for us, avoiding one copy.
A downside of this patch is that text gets slightly
bigger. This is because all zero() calls are effectively
inlined:
$ size build/.libs/systemd
text data bss dec hex filename
before 897737 107300 2560 1007597 f5fed build/.libs/systemd
after 897873 107300 2560 1007733 f6075 build/.libs/systemd
… actually less than 1‰.
A few asserts that the parameter is not null had to be removed. I
don't think this changes much, because first, it is quite unlikely
for the assert to fail, and second, an immediate SEGV is almost as
good as an assert. |
e62d8c3944745ed276e6d4f33153009860e5cfc5 |
|
31-Mar-2013 |
Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> |
Modernization
Use _cleanup_ and wrap lines to ~80 chars and such. |
a5c32cff1f56afe6f0c6c70d91a88a7a8238b2d7 |
|
14-Feb-2013 |
Harald Hoyer <harald@redhat.com> |
honor SELinux labels, when creating and writing config files
Also split out some fileio functions to fileio.c and provide a SELinux
aware pendant in fileio-label.c
see https://bugzilla.redhat.com/show_bug.cgi?id=881577 |
4819ff0358b6317c195fd4b1768e03d09c871070 |
|
20-Jul-2012 |
Lennart Poettering <lennart@poettering.net> |
unit: split off KillContext from ExecContext containing only kill definitions |
8351ceaea9480d9c2979aa2ff0f4982cfdfef58d |
|
17-Jul-2012 |
Lennart Poettering <lennart@poettering.net> |
execute: support syscall filtering using seccomp filters |
8600c525cb1420570e7670c963abd19c5696b683 |
|
04-Jun-2012 |
Kay Sievers <kay@vrfy.org> |
remove support for deprecated /proc/self/oom_adj |
d88a251b125f6e9178b9ca9ea47ab7da3234cb58 |
|
31-May-2012 |
Lennart Poettering <lennart@poettering.net> |
util: introduce a proper nsec_t and make use of it where appropriate |
5430f7f2bc7330f3088b894166bf3524a067e3d8 |
|
12-Apr-2012 |
Lennart Poettering <lennart@poettering.net> |
relicense to LGPLv2.1 (with exceptions)
We finally got the OK from all contributors with non-trivial commits to
relicense systemd from GPL2+ to LGPL2.1+.
Some udev bits continue to be GPL2+ for now, but we are looking into
relicensing them too, to allow free copy/paste of all code within
systemd.
The bits that used to be MIT continue to be MIT.
The big benefit of the relicensing is that closed source code may now
link against libsystemd-login.so and friends. |
b30e2f4c18ad81b04e4314fd191a5d458553773c |
|
11-Apr-2012 |
Kay Sievers <kay@vrfy.org> |
move libsystemd_core.la sources into core/ |