summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-04-12Merge pull request #5690 from yuwata/fix-5621Djalal Harouni
core: downgrade error message if command is prefixed with `-` and the…
2017-04-11networkd: Add bridge port priority setting (#5545)Dimitri John Ledkov
Allow setting bridge port priority in the Bridge section of the network file, similar to e.g. port path cost setting. Set the default to an invalid value of 128, and only set the port priority when it's not 128. Unlike e.g. path cost, zero is a valid priority value. Add a networkd-test.py to check that bridge port priority is correctly set. Incidently, fix bridge port cost type and document valid ranges.
2017-04-10tmpfiles: downgrade error message when operation is not supported (#5692)Yu Watanabe
Fixes #5607
2017-04-10core: fix values of BindPaths and BindReadOnlyPaths properties on 32-bit ↵Evgeny Vereshchagin
platforms (#5713) $ busctl get-property \ org.freedesktop.systemd1 \ /org/freedesktop/systemd1/unit/run_2dr471de87550554a6dbb165501c33c5dab_2eservice \ org.freedesktop.systemd1.Service BindReadOnlyPaths a(ssbt) 1 "/etc" "/etc" false 9228635523571007488 The correct values are 0 and 16384
2017-04-10core: downgrade legit error logs (#5705)umuttl
manager_sync_bus_names() function retrieves the dbus names and compares it with unit bus names. It could be right after the list is retrieved, the dbus peer is disconnected. In this case it is really not an ERROR print if sd_bus_get_name_creds() or sd_bus_creds_get_unique_name() fail.
2017-04-06Remove BTN_DPAD_* keys from ID_INPUT_KEY test (#5701)Nathaniel R. Lewis
At present, devices implementing the BTN_DPAD_UP/DOWN/LEFT/RIGHT codes will be incorrectly classified as key devices. This causes devices respecting the Linux gamepad spec (such as the DS3 as of kernel 4.12) to be classified as keyboards by X11. This is caused by the test_key function checking all codes on [KEY_OK, BTN_TRIGGER_HAPPY). Unfortunately the BTN_DPAD_* codes are placed between KEY_LIGHTS_TOGGLE and KEY_ALS_TOGGLE. This patch splits the upper key block check into the block before and after the BTN_DPAD_* codes. An array is used to avoid dedicated, per block loops in the event that more event codes are added in the future.
2017-04-05Merge pull request #5706 from keszybz/make-cleanupsLennart Poettering
Move busctl to its own dir and other cleanups
2017-04-05logind: Stopped inhibitions should be considered inactive (#5698)afrantzis
2017-04-04udev: rename gperf struct name to match other headersZbigniew Jędrzejewski-Szmek
This makes it easier to use the same generator script as for other gperf scripts. With automake each gperf file had it's own rule, but with meson I'm trying to use one script, and this inconsistency made that harder.
2017-04-04tree-wide: standardize on $(PACKAGE_VERSION) for the version stringZbigniew Jędrzejewski-Szmek
We defined both $(VERSION) and $(PACKAGE_VERSION) with the same contents. $(PACKAGE_VERSION) is slightly more descriptive, so settle on that, and drop the other define.
2017-04-04build-sys: use a single ENABLE_LOGIND conditionalZbigniew Jędrzejewski-Szmek
We used ENABLE_LOGIND for the automake conditional, and HAVE_LOGIND for the ifdef. That wasn't wrong, but it certainly was confusing. Also, move the ifdeffery to avoid warning about unused static function logind_set_wall_message() when logind is disabled.
2017-04-04shared/dissect-image: fix warning about unused function when !HAVE_BLKIDZbigniew Jędrzejewski-Szmek
2017-04-04Move busctl sources to src/busctlZbigniew Jędrzejewski-Szmek
busctl is not part of libsystemd, and should not be stored under libsystemd. In particular this is confusing because busctl is linked with libshared, but stuff in libsystemd is not supposed to depend on libshared.
2017-04-03core: downgrade error message if command is prefixed with `-` and the ↵Yu Watanabe
command is not found Fixes #5621
2017-04-01Merge pull request #5589 from jasonreeder/claimed_address_fixLennart Poettering
libsystemd-network: sd-ipv4ll: acquire new address after claimed addr…
2017-03-31libsystemd-network: sd-ipv4ll: acquire new address after claimed address ↵Jason Reeder
conflict If a conflict occurs on a claimed ipv4ll address, the device releases the address and then does not attempt to acquire a new ipv4ll address. According to RFC3927, releasing the address in this situation is correct. However, this should be followed by an attempt to configure a new ipv4ll address. This commit restarts the ipv4ll address acquisition state machine after releasing the conflicting address. From RFC3927 Section 2.5 conflict defense method (b): ... However, if this is not the first conflicting ARP packet the host has seen, and the time recorded for the previous conflicting ARP packet is recent, within DEFEND_INTERVAL seconds, then the host MUST immediately cease using this address and configure a new IPv4 Link-Local address as described above. ... Signed-off-by: Jason Reeder <jasonreeder@gmail.com>
2017-03-31libsystemd-network: sd-ipv4ll: Wrapper to restart address aquisition after ↵Jason Reeder
conflict After an ipv4ll claimed address conflict occurs a new address needs to be chosen and then the acquisition state machine needs to be restarted. This commit adds a function (sd_ipv4ll_restart) that clears the previously acquired address (ll->address) and then calls the existing sd_ipv4ll_start function to choose the new address and start the acquisition. Signed-off-by: Jason Reeder <jasonreeder@gmail.com>
2017-03-31nspawn: check if the DNS stub is listening for requestsDavid Michael
2017-03-31resolved: add a DNSStubListener property to ManagerDavid Michael
2017-03-31udev: net_id - support predictable ifnames on vio buses (#5675)Franck Bui
For IBM PowerVM Virtual I/O network devices, we can build predictable names based on the slot number passed as part of the OF "reg" property. Valid slot numbers range between 2-32767, so we only need the bottom half of the unit address passed. For example: /proc/device-tree/vdevice/l-lan@30000002 /proc/device-tree/vdevice/vnic@30000005 would initially map to something like: /sys/devices/vio/30000002/net/eth0 /sys/devices/vio/30000005/net/eth1 and would then translate to env2 and env5 This patch ignores the bus number, as there should only ever be one bus, and then remove leading zeros.
2017-03-31networkd: RFC compliant autonomous prefix handling (#5636)hendrikw01
Previously, `lifetime_valid` of a Router Advertisement was not handled the way RFC4862 has specified. In particular: Sections 5.5.3.d and 5.5.3.e
2017-03-31Merge pull request #5534 from ssahani/vxlan-labelLennart Poettering
networkd: vxlan support setting IPv6 flow label
2017-03-31networkd: fix route_new_static assert when IPv4LLRoute=true (#5676)Susant Sahani
fixes: #5664
2017-03-30journal: fix up syslog facility when forwarding native messages (#5667)Michael Biebl
Native journal messages (_TRANSPORT=journal) typically don't have a syslog facility attached to it. As a result when forwarding the messages to syslog they ended up with facility 0 (LOG_KERN). Apply syslog_fixup_facility() so we use LOG_USER instead. Fixes: #5640
2017-03-30sysv-generator: Provides: $network should also pull network.target to ↵Lukáš Nykrýn
transaction (#5652) network.target should be pulled in to the transaction by the unit that provides network services, but currently for initscripts it only pulls in network-online.target.
2017-03-29test-sizeof: add some struct-timespec related fieldsZbigniew Jędrzejewski-Szmek
Might help with #5264.
2017-03-29test-sizeof: do not link with libsystemd-sharedZbigniew Jędrzejewski-Szmek
This makes it much quicker to compile.
2017-03-29basic: forbid rm_rf() to remove paths ending with ".." (#5653)Jan Synacek
Fixes: #5644
2017-03-22units: simplify rescue.service and emergency.service (#5623)Michael Biebl
The emergency.service and rescue.service units have become rather convoluted. We spawn multiple shells and the help text spans multiple lines which makes the units hard to read. Move the logic into a single shell script and call that via ExecStart.
2017-03-21basic/journal-importer: Fix unaligned access in get_data_size() (#5622)John Paul Adrian Glaubitz
2017-03-21resolved: detect and warn other running LLMNR stackYu Watanabe
Previously, `SO_REUSEADDR` is set before `bind`-ing socket, Thus, even if another LLMNR stack is running, `bind` always success and we cannot detect the other stack. By this commit, we first try to `bind` without `SO_REUSEADDR`, and if it fails, show warning and retry with `SO_REUSEADDR`.
2017-03-21resolved: add global config option to control mDNS stackYu Watanabe
2017-03-21resolved: detect and warn other running mDNS stackYu Watanabe
Previously, `SO_REUSEADDR` is set before `bind`-ing socket, Thus, even if another mDNS stack (e.g. avahi) is running, `bind` always success and we cannot detect the other stack. By this commit, we first try to `bind` without `SO_REUSEADDR`, and if it fails, show warning and retry with `SO_REUSEADDR`.
2017-03-21resolved: do not start LLMNR or mDNS stack when no network enables themYu Watanabe
When no network enables LLMNR or mDNS, it is not necessary to create LLMNR or mDNS related sockets. So, let's create them only when LLMNR- or mDNS-enabled network becomes active or at least one network enables `LLMNR=` or `MulticastDNS=` options.
2017-03-20systemctl: fix broken vertical lines in list-dependencies --all (#5608)Felix Zhang
2017-03-16Merge (¾ of) pull request #5596 from matijaskala/masterZbigniew Jędrzejewski-Szmek
2017-03-15base-filesystem: skip fchownat() if the previous mkdirat() on same path ↵Djalal Harouni
failed (#5548) If we are working on a path that was marked to be ignored on errors, and the mkdirat() fails then add a continue statement and skip fchownat() call. This avoids the case where UID/GID are valid and we run fchownat() on non existent path which will fail hard even on paths that we want to ignore in case of errors.
2017-03-16check for _POSIX_C_SOURCE instead of __USE_POSIX*Matija Skala
check for _GNU_SOURCE as well as sd_event_child_handler_t needs to be defined correctly while compiling systemd
2017-03-16assigning stdout and stderr is not allowedMatija Skala
2017-03-15fix includesMatija Skala
linux/sockios.h is needed for the SIOCGSTAMPNS macro xlocale.h is included indirectly in glibc and doesn't even exist in other libcs
2017-03-14machinectl: don't return 1 in case we couldn't figure out container IP ↵Michal Sekletar
addresses (#5587) This is in spirit very similar to commit 4b2419165ce409ee55ce96a926302f89685f2293. Fixes: #5581
2017-03-14Never call unmap with MAP_FAILED. (#5590)Tobias Stoeckmann
When mmap is called, the code in correctly checks for p == MAP_FAILED. But the resource cleanup at the end of busname_peek_message checks for p == NULL, and if that's not true, munmap is called. Therefore in error case, munmap is called with a MAP_FAILED argument which can result in unexpected behaviour depending on sz's value. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
2017-03-14networkd: vxlan support setting IPv6 flow labeSusant Sahani
This work adds support for setting the IPv6 flow label for vxlan. vxlan.netdev NetDev] Description=vxlan-test Name=vxlan1 Kind=vxlan [VXLAN] Id=33 Local=2405:204:920b:29ac:7e7a:91ff:fe6d:ffe2 Remote=FF02:0:0:0:0:0:1:9 FlowLabel=104 ip -d link show vxlan1 8: vxlan1: <BROADCAST,MULTICAST> mtu 1430 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether be:83:aa:db:6b:cb brd ff:ff:ff:ff:ff:ff promiscuity 0 vxlan id 33 group ff02::1:9 local 2405:204:920b:29ac:7e7a:91ff:fe6d:ffe2 dev enp0s25 srcport 0 0 dstport 8472 flowlabel 0x68 ageing 300 noudpcsum noudp6zerocsumtx noudp6zerocsumrx addrgenmode eui64 numtxqueues 1 numrxqueues 1
2017-03-14sd-netlink: add vxlan netlink properties.Susant Sahani
2017-03-14missing.h: add vxlan netlink propertiesSusant Sahani
2017-03-13journal: prevent integer overflow while validating header (#5569)Tobias Stoeckmann
It is possible to overflow uint64_t while validating the header of a journal file. To prevent this, the addition itself is checked to be within the limits of UINT64_MAX first. To keep this readable, I have introduced two stack variables which hold the converted values during validation.
2017-03-13headers: check that __INCLUDE_LEVEL__ is defined before using it (#5575)Zbigniew Jędrzejewski-Szmek
That macro is a gcc extension, and while widely supported, not ubiquitous. In particular the coverity scanner is having trouble with it.
2017-03-12resolve: add missing space in output message (#5574)Yu Watanabe
2017-03-07sd-bus: drop kdbus-related docs (#5533)AsciiWolf
2017-03-07cgtop: use PRIu64 to print uint64_t (#5544)Thomas H. P. Andersen
Commit 59f448cf replaced usage of off_t with uint64_t. Change the format string to use PRIu64 to match it.