David Herrmann [Tue, 22 Sep 2015 13:05:35 +0000 (15:05 +0200)]
sd-ipv4acd: fix namespacing
Prefix all exported constants with SD_IPV4ACD to prevent namespacing
conflicts.
David Herrmann [Tue, 22 Sep 2015 12:59:51 +0000 (14:59 +0200)]
sd-icmp6-nd: fix namespacing
Prefix all exported constants by SD_ICMP6_ND_* to avoid any namespacing
conflicts.
David Herrmann [Tue, 22 Sep 2015 12:52:23 +0000 (14:52 +0200)]
sd-dhcp6: fix namespacing
Prefix all exported constants with SD_DHCP6_CLIENT_* to avoid any
namespacing conflicts.
David Herrmann [Tue, 22 Sep 2015 12:46:21 +0000 (14:46 +0200)]
sd-dhcp: fix namespacing
Prefix all constants with SD_DHCP_CLIENT_* to avoid namespacing
conflicts.
Lennart Poettering [Tue, 22 Sep 2015 00:34:45 +0000 (02:34 +0200)]
Merge pull request #1323 from dvdhrm/mount-propagate
mount: propagate error codes correctly
Lennart Poettering [Mon, 21 Sep 2015 23:05:27 +0000 (01:05 +0200)]
Merge pull request #1325 from splantefeve/fr-translation
po: update french translation
Sylvain Plantefève [Mon, 21 Sep 2015 22:23:49 +0000 (00:23 +0200)]
po: update french translation
David Herrmann [Mon, 21 Sep 2015 19:56:10 +0000 (21:56 +0200)]
hwdb: fix typo in G9x DPI
Fix typo in DPI: 32000 -> 3200
David Herrmann [Mon, 21 Sep 2015 18:11:17 +0000 (20:11 +0200)]
hwdb: drop weird whitespace
Remove whitespace from empty line in hwdb.
Daniel Mack [Mon, 21 Sep 2015 18:05:18 +0000 (20:05 +0200)]
Merge pull request #1317 from ronnychevalier/rc/ipv4ll_seed
sd-ipv4ll: do not assert_return when seed == 0
David Herrmann [Mon, 21 Sep 2015 17:59:07 +0000 (19:59 +0200)]
mount: propagate error codes correctly
Make sure to propagate error codes from mount-loops correctly. Right now,
we return the return-code of the first mount that did _something_. This is
not what we want. Make sure we return an error if _any_ mount fails (and
then make sure to return the first error to not hide proper errors due to
consequential errors like -ENOTDIR).
Reported by cee1 <fykcee1@gmail.com>.
Daniel Mack [Mon, 21 Sep 2015 17:43:49 +0000 (19:43 +0200)]
Merge pull request #1322 from evverx/update-systemd-cgtop-bash-completion
Update systemd-cgtop bash completion
Evgeny Vereshchagin [Mon, 21 Sep 2015 17:33:00 +0000 (17:33 +0000)]
shell-completion: cgtop bash completion: add -r,--raw,-k,-P,--order
Evgeny Vereshchagin [Mon, 21 Sep 2015 17:09:40 +0000 (17:09 +0000)]
shell-completion: cgtop bash completion: -n,--iterations,-d,--delay require arg
Lennart Poettering [Mon, 21 Sep 2015 17:00:28 +0000 (19:00 +0200)]
Merge pull request #1249 from lnykryn/sysv-symlinks
sysv-generator: follow symlinks in /etc/rc.d/init.d
Lennart Poettering [Mon, 21 Sep 2015 16:59:38 +0000 (18:59 +0200)]
Merge pull request #1321 from evverx/cgtop-recurisive-option
shell-completion: update systemd-cgtop bash completion: --recursive
Evgeny Vereshchagin [Mon, 21 Sep 2015 16:54:58 +0000 (16:54 +0000)]
shell-completion: update systemd-cgtop bash completion: --recursive
Lennart Poettering [Mon, 21 Sep 2015 16:21:53 +0000 (18:21 +0200)]
Merge pull request #1320 from ronnychevalier/rc/core_fix_group_ownership
core: fix group ownership when Group is set
Ronny Chevalier [Mon, 21 Sep 2015 13:45:51 +0000 (15:45 +0200)]
core: fix group ownership when Group is set
When Group is set in the unit, the runtime directories are owned by
this group and not the default group of the user (same for cgroup paths
and standard outputs)
Fix #1231
Ronny Chevalier [Mon, 21 Sep 2015 13:36:07 +0000 (15:36 +0200)]
test-execute: add tests for RuntimeDirectory
Lennart Poettering [Mon, 21 Sep 2015 16:10:49 +0000 (18:10 +0200)]
Merge pull request #1315 from systemd-mailing-devs/
1442692671-10134-1-git-send-email-dev@benjarobin.fr
systemd-notify: Always pass a valid pid to sd_pid_notify
Alban Crequy [Mon, 21 Sep 2015 15:51:21 +0000 (17:51 +0200)]
Merge pull request #1318 from alban/alban/container-exit-code4
containers: systemd exits with non-zero code
Alban Crequy [Fri, 18 Sep 2015 11:37:34 +0000 (13:37 +0200)]
containers: systemd exits with non-zero code
When a systemd service running in a container exits with a non-zero
code, it can be useful to terminate the container immediately and get
the exit code back to the host, when systemd-nspawn returns. This was
not possible to do. This patch adds the following to make it possible:
- Add a read-only "ExitCode" property on PID 1's "Manager" bus object.
By default, it is 0 so the behaviour stays the same as previously.
- Add a method "SetExitCode" on the same object. The method fails when
called on baremetal: it is only allowed in containers or in user
session.
- Add support in systemctl to call "systemctl exit 42". It reuses the
existing code for user session.
- Add exit.target and systemd-exit.service to the system instance.
- Change main() to actually call systemd-shutdown to exit() with the
correct value.
- Add verb 'exit' in systemd-shutdown with parameter --exit-code
- Update systemctl manpage.
I used the following to test it:
| $ sudo rkt --debug --insecure-skip-verify run \
| --mds-register=false --local docker://busybox \
| --exec=/bin/chroot -- /proc/1/root \
| systemctl --force exit 42
| ...
| Container rkt-
895a0cba-5c66-4fa5-831c-
e3f8ddc5810d failed with error code 42.
| $ echo $?
| 42
Fixes https://github.com/systemd/systemd/issues/1290
Ronny Chevalier [Mon, 21 Sep 2015 14:49:59 +0000 (16:49 +0200)]
test-ipv4ll: use unsigned instead of an array for a seed
ipv4ll use an unsigned instead of an uint8_t array. Hence, use an
unsigned seed instead of declaring an array and then dereferencing it
later.
Ronny Chevalier [Mon, 21 Sep 2015 14:51:31 +0000 (16:51 +0200)]
sd-ipv4ll: do not assert_return when seed == 0
Now that seed is an unsigned and not an array, we do not need to assert
on it.
Tom Gundersen [Mon, 21 Sep 2015 13:13:18 +0000 (15:13 +0200)]
Merge pull request #1288 from teg/ipv4acd-3
sd-ipv4acd: split out as separate library from sd-ipv4ll
Lennart Poettering [Mon, 21 Sep 2015 13:04:23 +0000 (15:04 +0200)]
Merge pull request #1311 from jsynacek/kill-errors-v2
core: extend KillUnit() to return error when no unit was killed
Lennart Poettering [Mon, 21 Sep 2015 12:55:48 +0000 (14:55 +0200)]
Merge pull request #1314 from evverx/cgtop-machine
cgtop: add -M/--machine
Evgeny Vereshchagin [Mon, 21 Sep 2015 12:04:45 +0000 (12:04 +0000)]
cgtop: add -M/--machine
Jan Synacek [Fri, 18 Sep 2015 09:56:53 +0000 (11:56 +0200)]
core: extend KillUnit() to return error when no unit was killed
Lennart Poettering [Sun, 20 Sep 2015 17:15:04 +0000 (19:15 +0200)]
Merge pull request #1292 from gebi/resolve-specifier-in-runtime-directory
load-fragment: resolve specifiers in RuntimeDirectory
Lennart Poettering [Sun, 20 Sep 2015 17:14:37 +0000 (19:14 +0200)]
Merge pull request #1305 from mrkara/master
[l10n] Added Turkish translation
Lennart Poettering [Sun, 20 Sep 2015 17:14:09 +0000 (19:14 +0200)]
Merge pull request #1309 from nazgul77/master
[l10n] Update German translation
nazgul77 [Sun, 20 Sep 2015 12:54:34 +0000 (14:54 +0200)]
Update German translation
Benjamin Robin [Sat, 19 Sep 2015 19:57:51 +0000 (21:57 +0200)]
systemd-notify: Always pass a valid pid to sd_pid_notify
If the option --pid was used, take the pid from this option, unless take
the parend pid. Using 0 as pid (ucred of systemd-notify) will result 99% of the
time in a failure with this error: "Cannot find unit for notify message of PID"
Shouldn't we use always the ppid, since the MAINPID is something else ?
Signed-off-by: Benjamin Robin <dev@benjarobin.fr>
Muhammet Kara [Sat, 19 Sep 2015 05:35:32 +0000 (08:35 +0300)]
[l10n] Added Turkish translation
Lennart Poettering [Fri, 18 Sep 2015 23:49:25 +0000 (01:49 +0200)]
Merge pull request #1303 from evverx/show-controller
cgls: show controller without args too
Evgeny Vereshchagin [Fri, 18 Sep 2015 17:58:28 +0000 (17:58 +0000)]
cgls: show controller without args too
Tom Gundersen [Fri, 21 Aug 2015 21:04:14 +0000 (23:04 +0200)]
sd-ipv4{acd,ll}: add simple test programs
These programs should be run manually, typically two instances on a
veth pair to check conflict detection.
Both test programs take the ifname as input, the ACD also takes the
IP address to check, whereas LL (optionally) takes the seed, which
determines the sequence of IP addresses to try.
Tom Gundersen [Fri, 21 Aug 2015 10:50:31 +0000 (12:50 +0200)]
sd-ipv4acd: introduce new library split out from sd-ipv4ll
This splits the Address Conflict Detection out of the Link Local
library so that we can reuse it for DHCP and static addresses in
the future.
Implements RFC5227.
Tom Gundersen [Thu, 20 Aug 2015 23:02:59 +0000 (01:02 +0200)]
sd-ipv4ll: simplify conflict handling
Use stop() and start() to drop some pulicate code.
Tom Gundersen [Thu, 20 Aug 2015 09:40:10 +0000 (11:40 +0200)]
sd-ipv4ll: rework callbacks
Firstly, no longer distinguish between STOP and INIT states.
Secondly, do not trigger STOP events when calls to sd_ipv4ll_*() fail. The
caller is the one who would receive the event and will already know that the
call to sd_ipv4ll_*() has failed, so it is redundant.
STOP events will now only be triggered by calling sd_ipv4ll_stop() explicitly
or by some internal error in the library triggered by receiving a packet or
an expiring timeout (i.e., any error that would otherwise not be reported
back to the consumer of the library).
Lastly, follow CODING_STYLE and always return NULL on unref. Protect from
objects being destroyed in callbacks accordingly.
Tom Gundersen [Thu, 20 Aug 2015 09:26:57 +0000 (11:26 +0200)]
sd-ipv4ll: don't allow changing MAC address whilst running
This requires the caller to stop and restart the statemachine if they want to
change the MAC address.
Tom Gundersen [Wed, 19 Aug 2015 22:09:08 +0000 (00:09 +0200)]
sd-ipv4ll: code cleanups
Simplify timeout handling.
Tom Gundersen [Wed, 19 Aug 2015 17:42:38 +0000 (19:42 +0200)]
sd-ipv4ll: remove duplicate packet verification
Most packets are filtered out by the BPF, so only check for the parts that may
actually differ.
Tom Gundersen [Wed, 19 Aug 2015 15:02:33 +0000 (17:02 +0200)]
sd-ipv4ll: minor cleanups
Tom Gundersen [Tue, 18 Aug 2015 21:58:58 +0000 (23:58 +0200)]
sd-ipv4ll: split out on_conflict() from on_packet()
Tom Gundersen [Tue, 18 Aug 2015 15:59:45 +0000 (17:59 +0200)]
sd-ipv4ll: split run_state_machine() into on_packet() and on_timeout()
Simplify the code a bit, no functional change.
Tom Gundersen [Tue, 18 Aug 2015 13:37:43 +0000 (15:37 +0200)]
sd-ipv4ll: filter out unwanted ARP packets in the kernel
We currently process every ARP packet, but we should only care about the ones
relating to our IP address.
Also rename ipv4ll helpers to apr-utils.[ch], and rework the helpers a bit.
Daniel Mack [Fri, 18 Sep 2015 12:53:35 +0000 (14:53 +0200)]
Merge pull request #1297 from NoXPhasma/g9fix
G9/G9x change to default resolutions
NoXPhasma [Fri, 18 Sep 2015 12:28:16 +0000 (14:28 +0200)]
G9/G9x change to default resolutions
Lennart Poettering [Fri, 18 Sep 2015 11:04:50 +0000 (13:04 +0200)]
Merge pull request #1241 from ssahani/net
networkd: add support for accept ra
Daniel Mack [Fri, 18 Sep 2015 10:17:52 +0000 (12:17 +0200)]
Merge pull request #1293 from NoXPhasma/G9
Add G9 and G9x [Call of Duty MW3 Edition] to hwdb
NoXPhasma [Fri, 18 Sep 2015 09:55:38 +0000 (11:55 +0200)]
Add G9 and G9x [Call of Duty MW3 Edition]
Michael Gebetsroither [Thu, 17 Sep 2015 20:54:13 +0000 (22:54 +0200)]
load-fragment: resolve specifiers in RuntimeDirectory
Martin Pitt [Thu, 17 Sep 2015 14:09:37 +0000 (16:09 +0200)]
Revert "keymap: Add Corsair K70"
This breaks the same vendor/product ID with the German keyboard layout. As this
is a hack around some weird keyboard driver bug, let's revert until this is
understood better.
See https://github.com/systemd/systemd/issues/1243
This reverts commit
a2aa71a9542492d6b34007b9dac28e4f10b4256d.
Daniel Mack [Wed, 16 Sep 2015 22:05:58 +0000 (00:05 +0200)]
Merge pull request #1285 from michich/fix-dbus-fd-recv
sd-bus: correct size calculation in DBus fd receive
Michal Schmidt [Wed, 16 Sep 2015 20:55:02 +0000 (22:55 +0200)]
sd-bus: correct size calculation in DBus fd receive
The size of the allocated array for received file descriptors was
incorrectly calculated. This did not matter when a single file
descriptor was received, but for more descriptors the allocation was
insufficient.
Lennart Poettering [Wed, 16 Sep 2015 18:59:31 +0000 (20:59 +0200)]
Merge pull request #1269 from zonque/netcls
cgroup: add support for net_cls controllers
Daniel Mack [Wed, 16 Sep 2015 15:59:11 +0000 (17:59 +0200)]
Merge pull request #1279 from teg/resolved-cname-cache
resolevd: cache - improve CNAME handling
Tom Gundersen [Thu, 3 Sep 2015 23:58:20 +0000 (01:58 +0200)]
resolved: cache - cache what we can of negative redirect chains
When a NXDATA or a NODATA response is received for an alias it may
include CNAME records from the redirect chain. We should cache the
response for each of these names to avoid needless roundtrips in
the future.
It is not sufficient to do the negative caching only for the
canonical name, as the included redirection chain is not guaranteed
to be complete. In fact, only the final CNAME record from the chain
is guaranteed to be included.
We take care not to cache entries that redirects outside the current
zone, as the SOA will then not be valid.
Tom Gundersen [Mon, 17 Aug 2015 05:56:57 +0000 (07:56 +0200)]
resolved: cache - handle CNAME redirection
CNAME records are special in the way they are treated by DNS servers,
and our cache should mimic that behavior: In case a domain name has an
alias, its CNAME record is returned in place of any other.
Our cache was not doing this despite caching the CNAME records, this
entailed needless lookups to re-resolve the CNAME.
Tom Gundersen [Thu, 3 Sep 2015 23:01:27 +0000 (01:01 +0200)]
resolved: cache - only allow putting a single question key at a time
Only one key is allowed per transaction now, so let's simplify things and only allow putting
one question key into the cache at a time.
Tom Gundersen [Thu, 3 Sep 2015 23:56:23 +0000 (01:56 +0200)]
resolved: rr - introduce dns_resource_key_new_redirect()
Takes a key and CNAME RR and returns the canonical RR of the right
type. Make use of this in dns_question_redirect().
Tom Gundersen [Thu, 3 Sep 2015 22:15:48 +0000 (00:15 +0200)]
resolved: rr - introduce dns_resource_key_new_cname()
Creates a new CNAME RR key with the same class and name as an existing key.
Tom Gundersen [Mon, 17 Aug 2015 06:38:48 +0000 (08:38 +0200)]
resolved: cache - clarify logging
Lennart Poettering [Wed, 16 Sep 2015 14:27:00 +0000 (16:27 +0200)]
Merge pull request #1278 from michich/nicer-asserts
nicer assert messages
Michal Schmidt [Mon, 14 Sep 2015 13:53:47 +0000 (15:53 +0200)]
basic: nicer xsprintf and xstrftime assert messages
It's nicer if the assertion failure message from a bad use of xsprintf
actually mentions xsprintf instead of the expression the macro is
implemented as.
The assert_message_se macro was added in the previous commit as an
internal helper, but it can also be used for customizing assertion
failure messages like in this case.
Example:
char buf[10];
xsprintf(buf, "This is a %s message.\n", "long");
Before:
Assertion '(size_t) snprintf(buf, ELEMENTSOF(buf), "This is a %s
message.\n", "long") < ELEMENTSOF(buf)' failed at foo.c:6, function
main(). Aborting.
After:
Assertion 'xsprintf: buf[] must be big enough' failed at foo.c:6,
function main(). Aborting.
Michal Schmidt [Mon, 14 Sep 2015 13:53:36 +0000 (15:53 +0200)]
basic: nicer assert messages
Make sure the assert expression is not macro-expanded before
stringification. This makes several assertion failure messages more
readable.
As an example:
assert(streq("foo", "bar"));
I'd rather see this:
Assertion 'streq("foo", "bar")' failed at foo.c:5, function main(). Aborting.
...than this, though awesome, incomprehensible truncated mess:
Assertion '(__extension__ ({ size_t __s1_len, __s2_len; (__builtin_constant_p ((
"foo")) && __builtin_constant_p (("bar")) && (__s1_len = strlen (("foo")), __s2_
len = strlen (("bar")), (!((size_t)(const void *)((("foo")) + 1) - (size_t)(cons
t void *)(("foo")) == 1) || __s1_len >= 4) && (!((size_t)(const void *)((("bar")
) + 1) - (size_t)(const void *)(("bar")) == 1) || __s2_len >= 4)) ? __builtin_st
rcmp (("foo"), ("bar")) : (__builtin_constant_p (("foo")) && ((size_t)(const voi
d *)((("foo")) + 1) - (size_t)(const void *)(("foo")) == 1) && (__s1_len = strle
n (("foo")), __s1_len < 4) ? (__builtin_constant_p (("bar")) && ((size_t)(const
void *)((("bar")) + 1) - (size_t)(const void *)(("bar")) == 1) ? __builtin_strcm
p (("foo"), ("bar")) : (__extension__ ({ const unsigned char *__s2 = (const unsi
gned char *) (const char *) (("bar")); int __result = (((const unsigned char *)
(const char *) (("foo")))[0] - __s2[0]); if (__s1_len > 0 && __result == 0) { __
result = (((const unsigned char *) (const char *) (("foo")))[1] - __s2[1]); if (
__s1_len > 1 && __result == 0) { __result = (((const unsigned char *) (const cha
r *) (("foo")))[2] - __s2[2]); if (__s1_len > 2 && __result == 0) __result = (((
const unsigned char *) (const char *) (("foo")))[3] - __s2[3]); } } __result; })
)) : (__builtin_constant_p (("bar")) && ((size_t)(const void *)((("bar")) + 1) -
(size_t)(const void *)(("bar")) == 1) && (__s2_len = strlen (("bar")), __s2_len
< 4) ? (__builtin_constant_p (("foo")) && ((size_t)(const void *)((("foo")) + 1
) - (size_t)(const void *)(("foo")) == 1) ? __builtin_strcmp (("foo"), ("bar"))
: (- (__extension__ ({ const unsigned char *__s2 = (const unsigned char *) (cons
t char *) (("foo")); int __result = (((const unsigned char *) (const char *) (("
bar")))[0] - __s2[0]); if (__s2_len > 0 && __result == 0) { __result = (((const
unsigned char *) (const char *) (("bar")))[1] - __s2[1]); if (__s2_len > 1 && __
result == 0) { __result = (((const unsigned char *) (const char *) (("bar")))[2]
- __s2[2]); if (__s2_len > 2 && __result == 0)
Michal Schmidt [Mon, 14 Sep 2015 18:32:17 +0000 (20:32 +0200)]
basic: make sure argument of ELEMENTSOF is an array
Using ELEMENTSOF on a pointer will result in a compilation error.
Daniel Mack [Thu, 15 Jan 2015 19:08:42 +0000 (20:08 +0100)]
cgroup: add support for net_cls controllers
Add a new config directive called NetClass= to CGroup enabled units.
Allowed values are positive numbers for fix assignments and "auto" for
picking a free value automatically, for which we need to keep track of
dynamically assigned net class IDs of units. Introduce a hash table for
this, and also record the last ID that was given out, so the allocator
can start its search for the next 'hole' from there. This could
eventually be optimized with something like an irb.
The class IDs up to 65536 are considered reserved and won't be
assigned automatically by systemd. This barrier can be made a config
directive in the future.
Values set in unit files are stored in the CGroupContext of the
unit and considered read-only. The actually assigned number (which
may have been chosen dynamically) is stored in the unit itself and
is guaranteed to remain stable as long as the unit is active.
In the CGroup controller, set the configured CGroup net class to
net_cls.classid. Multiple unit may share the same net class ID,
and those which do are linked together.
Daniel Mack [Tue, 15 Sep 2015 09:16:06 +0000 (11:16 +0200)]
Merge pull request #1270 from frandieguez/master
Add Galician translations
Fran Dieguez [Mon, 14 Sep 2015 22:20:51 +0000 (00:20 +0200)]
Add Galician language to LINGUAS file
Fran Dieguez [Mon, 14 Sep 2015 22:20:21 +0000 (00:20 +0200)]
Added Galician translations
Lennart Poettering [Mon, 14 Sep 2015 21:19:03 +0000 (23:19 +0200)]
Merge pull request #1250 from g2p/master
Hook more properties for transient units
Daniel Mack [Mon, 14 Sep 2015 15:27:11 +0000 (17:27 +0200)]
Merge pull request #1267 from systemd-mailing-devs/
1442233013-14985-1-git-send-email-hdegoede@redhat.com
hwdb: Add Thinkpad X1 carbon 3rd gen to 70-pointingstick.hwdb
Hans de Goede [Mon, 14 Sep 2015 12:16:53 +0000 (14:16 +0200)]
hwdb: Add Thinkpad X1 carbon 3rd gen to 70-pointingstick.hwdb
Like many other recent thinkpads the factory default pointingstick
sensitivity on these devices is quite low, making the pointingstick
very slow in moving the cursor.
This extends the existing hwdb rules for tweaking the sensitivity to
also apply to the X1 carbon 3rd gen model.
BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1200717
Daniel Mack [Mon, 14 Sep 2015 08:02:36 +0000 (10:02 +0200)]
Merge pull request #1259 from martinpitt/master
keymap: Add Corsair K70
Martin Pitt [Mon, 14 Sep 2015 07:26:19 +0000 (09:26 +0200)]
keymap: Add Corsair K70
Daniel Mack [Sun, 13 Sep 2015 18:44:30 +0000 (20:44 +0200)]
Merge pull request #1251 from poettering/cgroups-cleanup
cgroups cleanup + other fixes
Daniel Mack [Sun, 13 Sep 2015 17:44:50 +0000 (19:44 +0200)]
Merge pull request #1253 from victorenator/master
po: update Belarusian translation
Viktar Vauchkevich [Sat, 12 Sep 2015 13:47:18 +0000 (16:47 +0300)]
po: update Belarusian translation
Susant Sahani [Sat, 12 Sep 2015 02:48:36 +0000 (08:18 +0530)]
man: add support for accept ra man
Susant Sahani [Sat, 12 Sep 2015 02:48:06 +0000 (08:18 +0530)]
networkd:add support to configure ipv6 acceprt ra
This patch support to configure the ipv6 acceprt ra option.
for more information see
http://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/proc-sys-net-ipv6..html
Lennart Poettering [Fri, 11 Sep 2015 16:21:53 +0000 (18:21 +0200)]
cgroup: unify how we invalidate cgroup controller settings
Let's make sure that we follow the same codepaths when adjusting a
cgroup property via the dbus SetProperty() call, and when we execute the
StartupCPUShares= effect.
Lennart Poettering [Fri, 11 Sep 2015 16:18:01 +0000 (18:18 +0200)]
transaction: clarify via void-casting that we ignore the pipe2() return value for a reason
Lennart Poettering [Fri, 11 Sep 2015 16:15:58 +0000 (18:15 +0200)]
core: invalidate idle pipe event source in manager_close_idle_pipe()
In all occasions when this function is called we do so anyway, so let's
move this inside, to make things easier.
Lennart Poettering [Fri, 11 Sep 2015 16:15:08 +0000 (18:15 +0200)]
execute: fix return type from write()
Lennart Poettering [Fri, 11 Sep 2015 16:14:11 +0000 (18:14 +0200)]
execute: invalidate idle pipe after use
Not strictly necessary, but makes clear the fds are invalidated. Make
sure we do the same here as in most other cases.
Lennart Poettering [Fri, 11 Sep 2015 15:25:35 +0000 (17:25 +0200)]
core: allocate sets of startup and failed units on-demand
There's a good chance we never needs these sets, hence allocate them
only when needed.
Lennart Poettering [Fri, 11 Sep 2015 14:49:12 +0000 (16:49 +0200)]
timesyncd: fix how we print a PID
Lennart Poettering [Fri, 11 Sep 2015 14:48:24 +0000 (16:48 +0200)]
core: refactor cpu shares/blockio weight cgroup logic
Let's stop using the "unsigned long" type for weights/shares, and let's
just use uint64_t for this, as that's what we expose on the bus.
Unify parsers, and always validate the range for these fields.
Correct the default blockio weight to 500, since that's what the kernel
actually uses.
When parsing the weight/shares settings from unit files accept the empty
string as a way to reset the weight/shares value. When getting it via
the bus, uniformly map (uint64_t) -1 to unset.
Open up StartupCPUShares= and StartupBlockIOWeight= to transient units.
Lennart Poettering [Fri, 11 Sep 2015 14:26:31 +0000 (16:26 +0200)]
util: remove ring.[ch] + pty.[ch] and tests
This was used by consoled, which was removed, let's remove this too now.
Lennart Poettering [Fri, 11 Sep 2015 16:28:03 +0000 (18:28 +0200)]
TODO
Gabriel de Perthuis [Thu, 10 Sep 2015 14:45:28 +0000 (16:45 +0200)]
Hook more properties for transient units
systemd-run can now launch units with PrivateTmp, PrivateDevices,
PrivateNetwork, NoNewPrivileges set.
Lennart Poettering [Fri, 11 Sep 2015 14:28:36 +0000 (16:28 +0200)]
Merge pull request #1248 from lnykryn/loginctl-show-v2
loginctl: print nontrivial properties in logictl show-*
Lukas Nykryn [Fri, 11 Sep 2015 14:23:07 +0000 (16:23 +0200)]
sysv-generator: follow symlinks in /etc/rc.d/init.d
Some java packages puts a symlink to init.d and its content is pointing
to latest java installation (because you can have multiple javas on you
machine).
On rhel-based distributions you can use alternatives --initscript
instread of symlink, but this is not usable for other distributions.
Lukas Nykryn [Fri, 11 Sep 2015 11:37:59 +0000 (13:37 +0200)]
loginctl: print nontrivial properties in logictl show-*
Lennart Poettering [Fri, 11 Sep 2015 12:44:45 +0000 (14:44 +0200)]
Merge pull request #1245 from evverx/kill-control-on-timeout
core: kill processes started due to the ExecReload= on timeout
Evgeny Vereshchagin [Fri, 11 Sep 2015 08:42:35 +0000 (11:42 +0300)]
core: kill processes started due to the ExecReload= on timeout