I've written a post that shows how to list all mounts in all mount namespaces (all mounts on the system) using new apis we added to the #vfs last year.
Here's a blog story with the links to all those #systemd257 stories on Mastodon:
https://0pointer.net/blog/announcing-systemd-v257.html
Enjoy! And stay tuned for #systemd258!
1️⃣9️⃣ Here's the 19th post highlighting key new features of the upcoming v257 release of systemd. #systemd257
A relatively basic feature of systemd's service management is the ability to automatically restart a service in case it terminates unexpectedly, configurable via the Restart= setting.
In v254 we added the RestartMode= setting that allows to fine tune the mechanism to use for restarting the service, i.e. it adds a logic to optionally avoid marking the service as failed between…
@spacetelescope definitely worth clicking through: the image holds a second discovery that’s easier to overlook. Examine the white elliptical galaxy at left. A faint red arc appears in the inset at 10 o’clock. This is a very distant galaxy whose light is bent by the gravity of the elliptical foreground galaxy – and its appearance is duplicated. The stretched red arc is warped where it reappears – as a dot – at 4 o’clock. These images of the lensed galaxy are so faint and so red that they went unrecognized in Hubble data, but are unmistakable in Webb’s near-infrared image.
RE: https://astrodon.social/@spacetelescope/113568009758709150
8️⃣ Here's the 8th post highlighting key new features of the upcoming v257 release of systemd.
A longer time ago systemd introduced JSON based user records as an extension of classic UNIX `struct passwd`. These records can be provided via Varlink IPC or via drop-in files. The much richer set of account settings is documented here:
Had fun in at #OSSSummit in Tokyo yesterday demonstrating a TPM interposer attack obtaining the systemd cryptenroll boot keys
And also explaining how the new Linux Kernel TPM patches can help defeat this
For those who asked, my python3 interposer designed to steal the keys is here:
https://git.kernel.org/pub/scm/linux/kernel/git/jejb/tpm2-interposer.git/
Adding uchar.h to picolibc today. Instead of providing useful conversions between UTF-8, UTF-16 and UTF-32, all C23 provides is conversions between those and the awful "multibyte" representations. I can understand why they'd *also* want to connect UTF encodings to the legacy C APIs, but the most important thing we need is a way to validate UTF-8 input which has some pretty tricky corner cases involving missing bytes, overlong encodings, and surrogates. https://github.com/picolibc/picolibc/pull/861