1
0
mirror of https://github.com/systemd/systemd synced 2025-09-21 21:04:46 +02:00

Compare commits

..

No commits in common. "c7d26acce6dcb0e72be6160873fac758e9b7c440" and "251d3d20c3b8b4ef2b2b12f2e6b48e9b6de8d599" have entirely different histories.

8 changed files with 111 additions and 124 deletions

View File

@ -365,7 +365,7 @@
<term><varname>MaxLevelWall=</varname></term> <term><varname>MaxLevelWall=</varname></term>
<listitem><para>Controls the maximum log level of messages <listitem><para>Controls the maximum log level of messages
that are stored in the journal, forwarded to syslog, kmsg, the that are stored on disk, forwarded to syslog, kmsg, the
console or wall (if that is enabled, see above). As argument, console or wall (if that is enabled, see above). As argument,
takes one of takes one of
<literal>emerg</literal>, <literal>emerg</literal>,
@ -381,8 +381,8 @@
are stored/forwarded, messages above are dropped. Defaults to are stored/forwarded, messages above are dropped. Defaults to
<literal>debug</literal> for <varname>MaxLevelStore=</varname> <literal>debug</literal> for <varname>MaxLevelStore=</varname>
and <varname>MaxLevelSyslog=</varname>, to ensure that the all and <varname>MaxLevelSyslog=</varname>, to ensure that the all
messages are stored in the journal and forwarded to syslog. messages are written to disk and forwarded to syslog. Defaults
Defaults to to
<literal>notice</literal> for <varname>MaxLevelKMsg=</varname>, <literal>notice</literal> for <varname>MaxLevelKMsg=</varname>,
<literal>info</literal> for <varname>MaxLevelConsole=</varname>, <literal>info</literal> for <varname>MaxLevelConsole=</varname>,
and <literal>emerg</literal> for and <literal>emerg</literal> for

View File

@ -11,31 +11,30 @@
<refsection id='confd'> <refsection id='confd'>
<title>Configuration Directories and Precedence</title> <title>Configuration Directories and Precedence</title>
<para>Configuration files are read from directories in <filename>/etc/</filename>, <para>Configuration files are read from directories in <filename>/etc/</filename>, <filename>/run/</filename>,
<filename>/run/</filename>, <filename>/usr/local/lib/</filename>, and <filename>/usr/lib/</filename>, in <filename>/usr/local/lib/</filename>, and <filename>/usr/lib/</filename>, in order of precedence. Each
order of precedence, as listed in the SYNOPSIS section above. Files must have the the configuration file in these configuration directories shall be named in the style of
<literal>.conf</literal> extension. Files in <filename>/etc/</filename> override files with the same name <filename><replaceable>filename</replaceable>.conf</filename>. Files in <filename>/etc/</filename> override files
in <filename>/run/</filename>, <filename>/usr/local/lib/</filename>, and with the same name in <filename>/run/</filename>, <filename>/usr/local/lib/</filename>, and
<filename>/usr/lib/</filename>. Files in <filename>/run/</filename> override files with the same name <filename>/usr/lib/</filename>. Files in <filename>/run/</filename> override files with the same name under
under <filename>/usr/</filename>.</para> <filename>/usr/</filename>.</para>
<para>All configuration files are sorted by their filename in lexicographic order, regardless of which of <para>Packages should install their configuration files in <filename>/usr/lib/</filename> (distribution packages)
the directories they reside in. If multiple files specify the same option, the entry in the file with the or <filename>/usr/local/lib/</filename> (local installs). Files in <filename>/etc/</filename> are
lexicographically latest name will take precedence. Thus, the configuration in a certain file may either reserved for the local administrator, who may use this logic to override the
be replaced completely (by placing a file with the same name in a directory with higher priority), or configuration files installed by vendor packages. All configuration files
individual settings might be changed (by specifying additional settings in a file with a different name are sorted by their filename in lexicographic order, regardless of which of
that is ordered later).</para> the directories they reside in. If multiple files specify the same option,
the entry in the file with the lexicographically latest name will take
precedence. It is recommended to prefix all filenames with a two-digit number
and a dash, to simplify the ordering of the files.</para>
<para>Packages should install their configuration files in <filename>/usr/lib/</filename> (distribution <para>If the administrator wants to disable a configuration file supplied by
packages) or <filename>/usr/local/lib/</filename> (local installs). Files in <filename>/etc/</filename> the vendor, the recommended way is to place a symlink to
are reserved for the local administrator, who may use this logic to override the configuration files <filename>/dev/null</filename> in the configuration directory in
installed by vendor packages. It is recommended to prefix all filenames with a two-digit number and a <filename>/etc/</filename>, with the same filename as the vendor
dash, to simplify the ordering of the files.</para> configuration file. If the vendor configuration file is included in
the initrd image, the image has to be regenerated.</para>
<para>If the administrator wants to disable a configuration file supplied by the vendor, the recommended
way is to place a symlink to <filename>/dev/null</filename> in the configuration directory in
<filename>/etc/</filename>, with the same filename as the vendor configuration file. If the vendor
configuration file is included in the initrd image, the image has to be regenerated.</para>
</refsection> </refsection>
<refsection id='main-conf'> <refsection id='main-conf'>
@ -49,20 +48,25 @@
can be edited to create local overrides. can be edited to create local overrides.
</para> </para>
<para>When packages need to customize the configuration, they can install configuration snippets in <para>When packages need to customize the configuration, they can
<filename>/usr/lib/systemd/*.conf.d/</filename> or <filename>/usr/local/lib/systemd/*.conf.d/</filename>. install configuration snippets in
The main configuration file is read before any of the configuration directories, and has the lowest <filename>/usr/lib/systemd/*.conf.d/</filename> or
precedence; entries in a file in any configuration directory override entries in the single configuration <filename>/usr/local/lib/systemd/*.conf.d/</filename>. Files in
file. Files in the <filename>*.conf.d/</filename> configuration subdirectories are sorted by their <filename>/etc/</filename> are reserved for the local
filename in lexicographic order, regardless of in which of the subdirectories they reside. When multiple administrator, who may use this logic to override the
files specify the same option, for options which accept just a single value, the entry in the file with configuration files installed by vendor packages. The main
the lexicographically latest name takes precedence. For options which accept a list of values, entries configuration file is read before any of the configuration
are collected as they occur in files sorted lexicographically.</para> directories, and has the lowest precedence; entries in a file in
any configuration directory override entries in the single
<para>Files in <filename>/etc/</filename> are reserved for the local administrator, who may use this configuration file. Files in the <filename>*.conf.d/</filename>
logic to override the configuration files installed by vendor packages. It is recommended to prefix all configuration subdirectories are sorted by their filename in lexicographic
filenames in those subdirectories with a two-digit number and a dash, to simplify the ordering of the order, regardless of which of the subdirectories they reside in. When
files.</para> multiple files specify the same option, for options which accept just a
single value, the entry in the file with the lexicographically latest name
takes precedence. For options which accept a list of values, entries are
collected as they occur in files sorted lexicographically. It is recommended
to prefix all filenames in those subdirectories with a two-digit number and
a dash, to simplify the ordering of the files.</para>
<para>To disable a configuration file supplied by the vendor, the <para>To disable a configuration file supplied by the vendor, the
recommended way is to place a symlink to recommended way is to place a symlink to

View File

@ -20,7 +20,6 @@
#include "strv.h" #include "strv.h"
#include "time-util.h" #include "time-util.h"
#include "utf8.h" #include "utf8.h"
#include "virt.h"
#if ENABLE_EFI #if ENABLE_EFI
@ -222,41 +221,6 @@ int efi_set_variable_string(sd_id128_t vendor, const char *name, const char *v)
return efi_set_variable(vendor, name, u16, (char16_strlen(u16) + 1) * sizeof(char16_t)); return efi_set_variable(vendor, name, u16, (char16_strlen(u16) + 1) * sizeof(char16_t));
} }
bool is_efi_boot(void) {
if (detect_container() > 0)
return false;
return access("/sys/firmware/efi/", F_OK) >= 0;
}
static int read_flag(const char *varname) {
_cleanup_free_ void *v = NULL;
uint8_t b;
size_t s;
int r;
if (!is_efi_boot()) /* If this is not an EFI boot, assume the queried flags are zero */
return 0;
r = efi_get_variable(EFI_VENDOR_GLOBAL, varname, NULL, &v, &s);
if (r < 0)
return r;
if (s != 1)
return -EINVAL;
b = *(uint8_t *)v;
return !!b;
}
bool is_efi_secure_boot(void) {
return read_flag("SecureBoot") > 0;
}
bool is_efi_secure_boot_setup_mode(void) {
return read_flag("SetupMode") > 0;
}
int systemd_efi_options_variable(char **line) { int systemd_efi_options_variable(char **line) {
const char *e; const char *e;
int r; int r;

View File

@ -28,10 +28,6 @@ int efi_get_variable_string(sd_id128_t vendor, const char *name, char **p);
int efi_set_variable(sd_id128_t vendor, const char *name, const void *value, size_t size); int efi_set_variable(sd_id128_t vendor, const char *name, const void *value, size_t size);
int efi_set_variable_string(sd_id128_t vendor, const char *name, const char *p); int efi_set_variable_string(sd_id128_t vendor, const char *name, const char *p);
bool is_efi_boot(void);
bool is_efi_secure_boot(void);
bool is_efi_secure_boot_setup_mode(void);
int systemd_efi_options_variable(char **line); int systemd_efi_options_variable(char **line);
#else #else
@ -56,18 +52,6 @@ static inline int efi_set_variable_string(sd_id128_t vendor, const char *name, c
return -EOPNOTSUPP; return -EOPNOTSUPP;
} }
static inline bool is_efi_boot(void) {
return false;
}
static inline bool is_efi_secure_boot(void) {
return false;
}
static inline bool is_efi_secure_boot_setup_mode(void) {
return false;
}
static inline int systemd_efi_options_variable(char **line) { static inline int systemd_efi_options_variable(char **line) {
return -ENODATA; return -ENODATA;
} }

View File

@ -39,18 +39,6 @@ int proc_cmdline(char **ret) {
return read_one_line_file("/proc/cmdline", ret); return read_one_line_file("/proc/cmdline", ret);
} }
/* In SecureBoot mode this is probably not what you want. As your cmdline is
* cryptographically signed like when using Type #2 EFI Unified Kernel Images
* (https://systemd.io/BOOT_LOADER_SPECIFICATION/) The user's intention is then
* that the cmdline should not be modified. You want to make sure that the
* system starts up as exactly specified in the signed artifact. */
static int systemd_options_variable(char **line) {
if (is_efi_secure_boot())
return -ENODATA;
return systemd_efi_options_variable(line);
}
static int proc_cmdline_extract_first(const char **p, char **ret_word, ProcCmdlineFlags flags) { static int proc_cmdline_extract_first(const char **p, char **ret_word, ProcCmdlineFlags flags) {
const char *q = *p; const char *q = *p;
int r; int r;
@ -131,7 +119,7 @@ int proc_cmdline_parse(proc_cmdline_parse_t parse_item, void *data, ProcCmdlineF
/* We parse the EFI variable first, because later settings have higher priority. */ /* We parse the EFI variable first, because later settings have higher priority. */
r = systemd_options_variable(&line); r = systemd_efi_options_variable(&line);
if (r < 0 && r != -ENODATA) if (r < 0 && r != -ENODATA)
log_debug_errno(r, "Failed to get SystemdOptions EFI variable, ignoring: %m"); log_debug_errno(r, "Failed to get SystemdOptions EFI variable, ignoring: %m");
@ -262,7 +250,7 @@ int proc_cmdline_get_key(const char *key, ProcCmdlineFlags flags, char **ret_val
return r; return r;
line = mfree(line); line = mfree(line);
r = systemd_options_variable(&line); r = systemd_efi_options_variable(&line);
if (r == -ENODATA) if (r == -ENODATA)
return false; /* Not found */ return false; /* Not found */
if (r < 0) if (r < 0)

View File

@ -63,6 +63,40 @@ struct device_path device_path__contents;
struct device_path__packed device_path__contents _packed_; struct device_path__packed device_path__contents _packed_;
assert_cc(sizeof(struct device_path) == sizeof(struct device_path__packed)); assert_cc(sizeof(struct device_path) == sizeof(struct device_path__packed));
bool is_efi_boot(void) {
if (detect_container() > 0)
return false;
return access("/sys/firmware/efi/", F_OK) >= 0;
}
static int read_flag(const char *varname) {
_cleanup_free_ void *v = NULL;
uint8_t b;
size_t s;
int r;
if (!is_efi_boot()) /* If this is not an EFI boot, assume the queried flags are zero */
return 0;
r = efi_get_variable(EFI_VENDOR_GLOBAL, varname, NULL, &v, &s);
if (r < 0)
return r;
if (s != 1)
return -EINVAL;
b = *(uint8_t *)v;
return !!b;
}
bool is_efi_secure_boot(void) {
return read_flag("SecureBoot") > 0;
}
bool is_efi_secure_boot_setup_mode(void) {
return read_flag("SetupMode") > 0;
}
int efi_reboot_to_firmware_supported(void) { int efi_reboot_to_firmware_supported(void) {
_cleanup_free_ void *v = NULL; _cleanup_free_ void *v = NULL;

View File

@ -5,6 +5,9 @@
#if ENABLE_EFI #if ENABLE_EFI
bool is_efi_boot(void);
bool is_efi_secure_boot(void);
bool is_efi_secure_boot_setup_mode(void);
int efi_reboot_to_firmware_supported(void); int efi_reboot_to_firmware_supported(void);
int efi_get_reboot_to_firmware(void); int efi_get_reboot_to_firmware(void);
int efi_set_reboot_to_firmware(bool value); int efi_set_reboot_to_firmware(bool value);
@ -25,6 +28,18 @@ int efi_loader_get_features(uint64_t *ret);
#else #else
static inline bool is_efi_boot(void) {
return false;
}
static inline bool is_efi_secure_boot(void) {
return false;
}
static inline bool is_efi_secure_boot_setup_mode(void) {
return false;
}
static inline int efi_reboot_to_firmware_supported(void) { static inline int efi_reboot_to_firmware_supported(void) {
return -EOPNOTSUPP; return -EOPNOTSUPP;
} }

View File

@ -11,7 +11,6 @@
#include "conf-files.h" #include "conf-files.h"
#include "def.h" #include "def.h"
#include "errno-util.h"
#include "fd-util.h" #include "fd-util.h"
#include "fileio.h" #include "fileio.h"
#include "hashmap.h" #include "hashmap.h"
@ -86,15 +85,13 @@ static int apply_all(OrderedHashmap *sysctl_options) {
k = sysctl_write(option->key, option->value); k = sysctl_write(option->key, option->value);
if (k < 0) { if (k < 0) {
/* If the sysctl is not available in the kernel or we are running with reduced /* If the sysctl is not available in the kernel or we are running with reduced
* privileges and cannot write it, then log about the issue, and proceed without * privileges and cannot write it, then log about the issue at LOG_NOTICE level, and
* failing. (EROFS is treated as a permission problem here, since that's how * proceed without failing. (EROFS is treated as a permission problem here, since
* container managers usually protected their sysctls.) In all other cases log an * that's how container managers usually protected their sysctls.) In all other cases
* error and make the tool fail. */ * log an error and make the tool fail. */
if (option->ignore_failure || k == -EROFS || ERRNO_IS_PRIVILEGE(k)) if (IN_SET(k, -EPERM, -EACCES, -EROFS, -ENOENT) || option->ignore_failure)
log_debug_errno(k, "Couldn't write '%s' to '%s', ignoring: %m", option->value, option->key); log_notice_errno(k, "Couldn't write '%s' to '%s', ignoring: %m", option->value, option->key);
else if (k == -ENOENT)
log_info_errno(k, "Couldn't write '%s' to '%s', ignoring: %m", option->value, option->key);
else { else {
log_error_errno(k, "Couldn't write '%s' to '%s': %m", option->value, option->key); log_error_errno(k, "Couldn't write '%s' to '%s': %m", option->value, option->key);
if (r == 0) if (r == 0)
@ -125,7 +122,7 @@ static bool test_prefix(const char *p) {
return false; return false;
} }
static int parse_file(OrderedHashmap **sysctl_options, const char *path, bool ignore_enoent) { static int parse_file(OrderedHashmap *sysctl_options, const char *path, bool ignore_enoent) {
_cleanup_fclose_ FILE *f = NULL; _cleanup_fclose_ FILE *f = NULL;
unsigned c = 0; unsigned c = 0;
int r; int r;
@ -186,10 +183,7 @@ static int parse_file(OrderedHashmap **sysctl_options, const char *path, bool ig
if (!test_prefix(p)) if (!test_prefix(p))
continue; continue;
if (ordered_hashmap_ensure_allocated(sysctl_options, &option_hash_ops) < 0) existing = ordered_hashmap_get(sysctl_options, p);
return log_oom();
existing = ordered_hashmap_get(*sysctl_options, p);
if (existing) { if (existing) {
if (streq(value, existing->value)) { if (streq(value, existing->value)) {
existing->ignore_failure = existing->ignore_failure || ignore_failure; existing->ignore_failure = existing->ignore_failure || ignore_failure;
@ -197,14 +191,14 @@ static int parse_file(OrderedHashmap **sysctl_options, const char *path, bool ig
} }
log_debug("Overwriting earlier assignment of %s at '%s:%u'.", p, path, c); log_debug("Overwriting earlier assignment of %s at '%s:%u'.", p, path, c);
option_free(ordered_hashmap_remove(*sysctl_options, p)); option_free(ordered_hashmap_remove(sysctl_options, p));
} }
new_option = option_new(p, value, ignore_failure); new_option = option_new(p, value, ignore_failure);
if (!new_option) if (!new_option)
return log_oom(); return log_oom();
k = ordered_hashmap_put(*sysctl_options, new_option->key, new_option); k = ordered_hashmap_put(sysctl_options, new_option->key, new_option);
if (k < 0) if (k < 0)
return log_error_errno(k, "Failed to add sysctl variable %s to hashmap: %m", p); return log_error_errno(k, "Failed to add sysctl variable %s to hashmap: %m", p);
@ -326,13 +320,17 @@ static int run(int argc, char *argv[]) {
umask(0022); umask(0022);
sysctl_options = ordered_hashmap_new(&option_hash_ops);
if (!sysctl_options)
return log_oom();
if (argc > optind) { if (argc > optind) {
int i; int i;
r = 0; r = 0;
for (i = optind; i < argc; i++) { for (i = optind; i < argc; i++) {
k = parse_file(&sysctl_options, argv[i], false); k = parse_file(sysctl_options, argv[i], false);
if (k < 0 && r == 0) if (k < 0 && r == 0)
r = k; r = k;
} }
@ -351,7 +349,7 @@ static int run(int argc, char *argv[]) {
} }
STRV_FOREACH(f, files) { STRV_FOREACH(f, files) {
k = parse_file(&sysctl_options, *f, true); k = parse_file(sysctl_options, *f, true);
if (k < 0 && r == 0) if (k < 0 && r == 0)
r = k; r = k;
} }