summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-04-05Merge pull request #5706 from keszybz/make-cleanupsLennart Poettering
Move busctl to its own dir and other cleanups
2017-04-05logind: Stopped inhibitions should be considered inactive (#5698)afrantzis
2017-04-04udev: rename gperf struct name to match other headersZbigniew Jędrzejewski-Szmek
This makes it easier to use the same generator script as for other gperf scripts. With automake each gperf file had it's own rule, but with meson I'm trying to use one script, and this inconsistency made that harder.
2017-04-04tree-wide: standardize on $(PACKAGE_VERSION) for the version stringZbigniew Jędrzejewski-Szmek
We defined both $(VERSION) and $(PACKAGE_VERSION) with the same contents. $(PACKAGE_VERSION) is slightly more descriptive, so settle on that, and drop the other define.
2017-04-04build-sys: use a single ENABLE_LOGIND conditionalZbigniew Jędrzejewski-Szmek
We used ENABLE_LOGIND for the automake conditional, and HAVE_LOGIND for the ifdef. That wasn't wrong, but it certainly was confusing. Also, move the ifdeffery to avoid warning about unused static function logind_set_wall_message() when logind is disabled.
2017-04-04shared/dissect-image: fix warning about unused function when !HAVE_BLKIDZbigniew Jędrzejewski-Szmek
2017-04-04Move busctl sources to src/busctlZbigniew Jędrzejewski-Szmek
busctl is not part of libsystemd, and should not be stored under libsystemd. In particular this is confusing because busctl is linked with libshared, but stuff in libsystemd is not supposed to depend on libshared.
2017-04-03core: downgrade error message if command is prefixed with `-` and the ↵Yu Watanabe
command is not found Fixes #5621
2017-04-01Merge pull request #5589 from jasonreeder/claimed_address_fixLennart Poettering
libsystemd-network: sd-ipv4ll: acquire new address after claimed addr…
2017-03-31libsystemd-network: sd-ipv4ll: acquire new address after claimed address ↵Jason Reeder
conflict If a conflict occurs on a claimed ipv4ll address, the device releases the address and then does not attempt to acquire a new ipv4ll address. According to RFC3927, releasing the address in this situation is correct. However, this should be followed by an attempt to configure a new ipv4ll address. This commit restarts the ipv4ll address acquisition state machine after releasing the conflicting address. From RFC3927 Section 2.5 conflict defense method (b): ... However, if this is not the first conflicting ARP packet the host has seen, and the time recorded for the previous conflicting ARP packet is recent, within DEFEND_INTERVAL seconds, then the host MUST immediately cease using this address and configure a new IPv4 Link-Local address as described above. ... Signed-off-by: Jason Reeder <jasonreeder@gmail.com>
2017-03-31libsystemd-network: sd-ipv4ll: Wrapper to restart address aquisition after ↵Jason Reeder
conflict After an ipv4ll claimed address conflict occurs a new address needs to be chosen and then the acquisition state machine needs to be restarted. This commit adds a function (sd_ipv4ll_restart) that clears the previously acquired address (ll->address) and then calls the existing sd_ipv4ll_start function to choose the new address and start the acquisition. Signed-off-by: Jason Reeder <jasonreeder@gmail.com>
2017-03-31nspawn: check if the DNS stub is listening for requestsDavid Michael
2017-03-31resolved: add a DNSStubListener property to ManagerDavid Michael
2017-03-31udev: net_id - support predictable ifnames on vio buses (#5675)Franck Bui
For IBM PowerVM Virtual I/O network devices, we can build predictable names based on the slot number passed as part of the OF "reg" property. Valid slot numbers range between 2-32767, so we only need the bottom half of the unit address passed. For example: /proc/device-tree/vdevice/l-lan@30000002 /proc/device-tree/vdevice/vnic@30000005 would initially map to something like: /sys/devices/vio/30000002/net/eth0 /sys/devices/vio/30000005/net/eth1 and would then translate to env2 and env5 This patch ignores the bus number, as there should only ever be one bus, and then remove leading zeros.
2017-03-31networkd: RFC compliant autonomous prefix handling (#5636)hendrikw01
Previously, `lifetime_valid` of a Router Advertisement was not handled the way RFC4862 has specified. In particular: Sections 5.5.3.d and 5.5.3.e
2017-03-31Merge pull request #5534 from ssahani/vxlan-labelLennart Poettering
networkd: vxlan support setting IPv6 flow label
2017-03-31networkd: fix route_new_static assert when IPv4LLRoute=true (#5676)Susant Sahani
fixes: #5664
2017-03-30journal: fix up syslog facility when forwarding native messages (#5667)Michael Biebl
Native journal messages (_TRANSPORT=journal) typically don't have a syslog facility attached to it. As a result when forwarding the messages to syslog they ended up with facility 0 (LOG_KERN). Apply syslog_fixup_facility() so we use LOG_USER instead. Fixes: #5640
2017-03-30sysv-generator: Provides: $network should also pull network.target to ↵Lukáš Nykrýn
transaction (#5652) network.target should be pulled in to the transaction by the unit that provides network services, but currently for initscripts it only pulls in network-online.target.
2017-03-29test-sizeof: add some struct-timespec related fieldsZbigniew Jędrzejewski-Szmek
Might help with #5264.
2017-03-29test-sizeof: do not link with libsystemd-sharedZbigniew Jędrzejewski-Szmek
This makes it much quicker to compile.
2017-03-29basic: forbid rm_rf() to remove paths ending with ".." (#5653)Jan Synacek
Fixes: #5644
2017-03-22units: simplify rescue.service and emergency.service (#5623)Michael Biebl
The emergency.service and rescue.service units have become rather convoluted. We spawn multiple shells and the help text spans multiple lines which makes the units hard to read. Move the logic into a single shell script and call that via ExecStart.
2017-03-21basic/journal-importer: Fix unaligned access in get_data_size() (#5622)John Paul Adrian Glaubitz
2017-03-21resolved: detect and warn other running LLMNR stackYu Watanabe
Previously, `SO_REUSEADDR` is set before `bind`-ing socket, Thus, even if another LLMNR stack is running, `bind` always success and we cannot detect the other stack. By this commit, we first try to `bind` without `SO_REUSEADDR`, and if it fails, show warning and retry with `SO_REUSEADDR`.
2017-03-21resolved: add global config option to control mDNS stackYu Watanabe
2017-03-21resolved: detect and warn other running mDNS stackYu Watanabe
Previously, `SO_REUSEADDR` is set before `bind`-ing socket, Thus, even if another mDNS stack (e.g. avahi) is running, `bind` always success and we cannot detect the other stack. By this commit, we first try to `bind` without `SO_REUSEADDR`, and if it fails, show warning and retry with `SO_REUSEADDR`.
2017-03-21resolved: do not start LLMNR or mDNS stack when no network enables themYu Watanabe
When no network enables LLMNR or mDNS, it is not necessary to create LLMNR or mDNS related sockets. So, let's create them only when LLMNR- or mDNS-enabled network becomes active or at least one network enables `LLMNR=` or `MulticastDNS=` options.
2017-03-20systemctl: fix broken vertical lines in list-dependencies --all (#5608)Felix Zhang
2017-03-16Merge (¾ of) pull request #5596 from matijaskala/masterZbigniew Jędrzejewski-Szmek
2017-03-15base-filesystem: skip fchownat() if the previous mkdirat() on same path ↵Djalal Harouni
failed (#5548) If we are working on a path that was marked to be ignored on errors, and the mkdirat() fails then add a continue statement and skip fchownat() call. This avoids the case where UID/GID are valid and we run fchownat() on non existent path which will fail hard even on paths that we want to ignore in case of errors.
2017-03-16check for _POSIX_C_SOURCE instead of __USE_POSIX*Matija Skala
check for _GNU_SOURCE as well as sd_event_child_handler_t needs to be defined correctly while compiling systemd
2017-03-16assigning stdout and stderr is not allowedMatija Skala
2017-03-15fix includesMatija Skala
linux/sockios.h is needed for the SIOCGSTAMPNS macro xlocale.h is included indirectly in glibc and doesn't even exist in other libcs
2017-03-14machinectl: don't return 1 in case we couldn't figure out container IP ↵Michal Sekletar
addresses (#5587) This is in spirit very similar to commit 4b2419165ce409ee55ce96a926302f89685f2293. Fixes: #5581
2017-03-14Never call unmap with MAP_FAILED. (#5590)Tobias Stoeckmann
When mmap is called, the code in correctly checks for p == MAP_FAILED. But the resource cleanup at the end of busname_peek_message checks for p == NULL, and if that's not true, munmap is called. Therefore in error case, munmap is called with a MAP_FAILED argument which can result in unexpected behaviour depending on sz's value. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2017-03-14networkd: vxlan support setting IPv6 flow labeSusant Sahani
This work adds support for setting the IPv6 flow label for vxlan. vxlan.netdev NetDev] Description=vxlan-test Name=vxlan1 Kind=vxlan [VXLAN] Id=33 Local=2405:204:920b:29ac:7e7a:91ff:fe6d:ffe2 Remote=FF02:0:0:0:0:0:1:9 FlowLabel=104 ip -d link show vxlan1 8: vxlan1: <BROADCAST,MULTICAST> mtu 1430 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether be:83:aa:db:6b:cb brd ff:ff:ff:ff:ff:ff promiscuity 0 vxlan id 33 group ff02::1:9 local 2405:204:920b:29ac:7e7a:91ff:fe6d:ffe2 dev enp0s25 srcport 0 0 dstport 8472 flowlabel 0x68 ageing 300 noudpcsum noudp6zerocsumtx noudp6zerocsumrx addrgenmode eui64 numtxqueues 1 numrxqueues 1
2017-03-14sd-netlink: add vxlan netlink properties.Susant Sahani
2017-03-14missing.h: add vxlan netlink propertiesSusant Sahani
2017-03-13journal: prevent integer overflow while validating header (#5569)Tobias Stoeckmann
It is possible to overflow uint64_t while validating the header of a journal file. To prevent this, the addition itself is checked to be within the limits of UINT64_MAX first. To keep this readable, I have introduced two stack variables which hold the converted values during validation.
2017-03-13headers: check that __INCLUDE_LEVEL__ is defined before using it (#5575)Zbigniew Jędrzejewski-Szmek
That macro is a gcc extension, and while widely supported, not ubiquitous. In particular the coverity scanner is having trouble with it.
2017-03-12resolve: add missing space in output message (#5574)Yu Watanabe
2017-03-07sd-bus: drop kdbus-related docs (#5533)AsciiWolf
2017-03-07cgtop: use PRIu64 to print uint64_t (#5544)Thomas H. P. Andersen
Commit 59f448cf replaced usage of off_t with uint64_t. Change the format string to use PRIu64 to match it.
2017-03-06Merge pull request #5540 from keszybz/coredump-eof-fixDjalal Harouni
coredump: fix handling of premature-eof for --backtrace
2017-03-05coredump: fix handling of premature-eof data for --backtraceZbigniew Jędrzejewski-Szmek
We'd fail with an assert in journal_importer_process_data(), because that function requires the caller to handle EOF themselves.
2017-03-05Merge pull request #5525 from martinpitt/khash-notsuppDjalal Harouni
test: skip instead of fail if crypto kmods are not available
2017-03-05import: bump image size safety limit for machinectl pull (#5535)Dax Kelson
We currenly use 40GB images in our environment
2017-03-03test: skip instead of fail if crypto kmods are not availableMartin Pitt
Package build machines may have module loading disabled, thus AF_ALG sockets are not available. Skip the tests that cover those (khash and id128) instead of failing them in this case. Fixes #5524
2017-03-02Avoid strict DM interface version dependencies (#5519)Michael Biebl
Compiling against the dm-ioctl.h header as provided by the Linux kernel will embed the DM interface version number. Running an older kernel can result in an error like this on shutdown: Could not detach DM dm-11: ioctl mismatch, kernel(4.34.4), user(4.35.4) Work around this by shipping a local copy of dm-ioctl.h. We need at least the version from 3.13 for DM_DEFERRED_REMOVE [1], so bump the requirements in README accordingly. [1] https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c140a246dc0bc085b98eddde978060fcec1080c Fixes: #5492