]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
3 years agotest-network: add a testcase for DHCP static lease 19743/head
borna-blazevic [Thu, 27 May 2021 05:50:19 +0000 (14:50 +0900)] 
test-network: add a testcase for DHCP static lease

3 years agonetwork: dhcp-server: introduce [DHCPServerStaticLease] section
borna-blazevic [Tue, 20 Oct 2020 19:46:15 +0000 (21:46 +0200)] 
network: dhcp-server: introduce [DHCPServerStaticLease] section

3 years agosd-dhcp-server: support static address to DHCPv4 offer
borna-blazevic [Thu, 23 Apr 2020 08:23:18 +0000 (10:23 +0200)] 
sd-dhcp-server: support static address to DHCPv4 offer

3 years agoMerge pull request #19736 from poettering/udev-trigger-uuid
Yu Watanabe [Thu, 27 May 2021 04:05:00 +0000 (13:05 +0900)] 
Merge pull request #19736 from poettering/udev-trigger-uuid

sd-device: add support for triggering devices with UUID support

3 years agoman: fix tag type
Christian Hesse [Wed, 26 May 2021 20:52:47 +0000 (22:52 +0200)] 
man: fix tag type

This is an option, not a command.

3 years agohash-func: change value type of string_hash_ops_free_free to void* 19736/head
Lennart Poettering [Wed, 26 May 2021 19:40:43 +0000 (21:40 +0200)] 
hash-func: change value type of string_hash_ops_free_free to void*

The generic string_hash_ops_free_free hash operations vtable currently
assumes the data pointer is of type char*. There's really no reason to
assume that though, we regularly store non-string data as value in a
hashmap. Hence, to accomodate for that, use void* as pointer for the
value (and keep char* for the key, as that's what
string_hash_ops_free_free is for, after all).

3 years agoudevadm: make use of the new uuid-enabled triggering for "udevadm trigger"
Lennart Poettering [Wed, 26 May 2021 14:13:39 +0000 (16:13 +0200)] 
udevadm: make use of the new uuid-enabled triggering for "udevadm trigger"

This adds two things:

- A new switch --uuid is added to "udevadm trigger". If specified a
  random UUID is associated with the synthettic uevent and it is printed
  to stdout. It may then be used manually to match up uevents as they
  propagate through the system.

- The UUID logic is now implicitly enabled if "udevadm trigger --settle"
  is used, in order to wait for precisely the uevents we actually
  trigger. Fallback support is kept for pre-4.13 kernels (where the
  requests for trigger uevents with uuids results in EINVAL).

3 years agosd-device: add API for triggering synthetic uevents with UUID
Lennart Poettering [Wed, 26 May 2021 14:09:18 +0000 (16:09 +0200)] 
sd-device: add API for triggering synthetic uevents with UUID

Since kernel 4.13 the kerne allows passing a UUID to generated uevents.
Optionally do so via a new sd_device_trigger_with_uuid() call, and add
sd_device_get_trigger_uuid() as helper to retrieve the UUID from a
uevent we receive.

This is useful for tracking uevents through the udev system, and waiting
for specific triggers.

(Note that the 4.13 patch allows passing arbitrary meta-info into the
uevent as well. This does not add an API for that, because I am not
convinced it makes sense — as it conflicts with our general rule that
events are "stateless" if you so will — and it complicates the interface
quite a bit).

This replaces #13881 in a way, which added a similar infra, but which
stalled, and whose synchronous settling APIs are somewhat problematic
and probably not material to merge.

3 years agoman: document that it is guaranteed that generated ID128 are never all-zero or all-one
Lennart Poettering [Wed, 26 May 2021 14:07:55 +0000 (16:07 +0200)] 
man: document that it is guaranteed that generated ID128 are never all-zero or all-one

This is the case because the ID128 we generate are all marked as v4 UUID
which requires that some bits are zero and others are one. Let's
document this so that people can rely on SD_ID128_NULL being a special
value for "uninitialized" that is always distinguishable from generated
UUIDs.

3 years agoupdate TODO
Lennart Poettering [Wed, 26 May 2021 19:42:32 +0000 (21:42 +0200)] 
update TODO

3 years agoMerge pull request #19737 from poettering/default-specifiers-env
Lennart Poettering [Wed, 26 May 2021 19:38:38 +0000 (21:38 +0200)] 
Merge pull request #19737 from poettering/default-specifiers-env

pid1: add specifier expansion for DefaultEnvironment=

3 years agoMount all fs nosuid when NoNewPrivileges=yes
Topi Miettinen [Fri, 22 Jan 2021 15:14:50 +0000 (17:14 +0200)] 
Mount all fs nosuid when NoNewPrivileges=yes

When `NoNewPrivileges=yes`, the service shouldn't have a need for any
setuid/setgid programs, so in case there will be a new mount namespace anyway,
mount the file systems with MS_NOSUID.

3 years agoman: fix list of escaped characters in unit names
Lennart Poettering [Wed, 26 May 2021 11:55:37 +0000 (13:55 +0200)] 
man: fix list of escaped characters in unit names

The code works differently than the docs, and the code is right here.
Fix the doc hence.

See VALID_CHARS in unit-name.c for details about allowed chars in unit
names, but keep in mind that "-" and "\" are special, since generated by
the escaping logic: they are OK to show up in unit names, but need to be
escaped when converting foreign strings to unit names to make sure
things remain reversible.

Fixes: #19623
3 years agoMerge pull request #19729 from poettering/networkctl-netns-check
Lennart Poettering [Wed, 26 May 2021 15:26:34 +0000 (17:26 +0200)] 
Merge pull request #19729 from poettering/networkctl-netns-check

networkctl: check that client netns matches networkd netns

3 years agocore: support specifier expansion in DefaultEnvironment= and ManagerEnvironment= 19737/head
Lennart Poettering [Wed, 26 May 2021 15:17:11 +0000 (17:17 +0200)] 
core: support specifier expansion in DefaultEnvironment= and ManagerEnvironment=

Strictly speaking adding this is a compatibility break, given that
previously % weren't special. But I'd argue that was simply a bug, as
for the much more prominent Environment= service setting we always
resolved specifiers, and DEfaultEnvironment= is explicitly listed as
being the default for that. Hence, let's fix that.

Replaces: #16787

3 years agorepart: resolve $TMP specifiers too
Lennart Poettering [Wed, 26 May 2021 15:10:56 +0000 (17:10 +0200)] 
repart: resolve $TMP specifiers too

This might be useful for CopyFiles=, to reference some subdir of $TMP in
a generic way. This allows us to use the new common
system_and_tmp_specifier_table[].

3 years agosysusers: add a generic specifier table for common cases
Lennart Poettering [Wed, 26 May 2021 15:08:38 +0000 (17:08 +0200)] 
sysusers: add a generic specifier table for common cases

This moves the definition of the specifier table consisting only of
system and /tmp specifiers into generic code so that we can share it.
This patch only adds one user of it for now. Follow-up patches will add
more.

3 years agohexdecoct: make return parameters of unbase64mem() and unhexmem() optional
Lennart Poettering [Wed, 26 May 2021 11:32:11 +0000 (13:32 +0200)] 
hexdecoct: make return parameters of unbase64mem() and unhexmem() optional

Inspired by: #19059

3 years agotest-network: refuse RA if not necessary 19729/head
Yu Watanabe [Wed, 26 May 2021 12:22:13 +0000 (21:22 +0900)] 
test-network: refuse RA if not necessary

3 years agotest-network: wait for that the link is in configuring state at the beginning
Yu Watanabe [Wed, 26 May 2021 12:13:56 +0000 (21:13 +0900)] 
test-network: wait for that the link is in configuring state at the beginning

3 years agoman: document udevadm info output prefixes
Lennart Poettering [Wed, 26 May 2021 08:54:57 +0000 (10:54 +0200)] 
man: document udevadm info output prefixes

Fixes: #19663
3 years agoman: try to clarify that nss-mymachines does not provide name resolution outside...
Lennart Poettering [Wed, 26 May 2021 09:10:18 +0000 (11:10 +0200)] 
man: try to clarify that nss-mymachines does not provide name resolution outside its own scope

Fixes: #18229
3 years agoman: explicit say for priority/weight values whether more is more or less
Lennart Poettering [Wed, 26 May 2021 09:23:06 +0000 (11:23 +0200)] 
man: explicit say for priority/weight values whether more is more or less

Fixes: #17523
3 years agonetworkctl: politely refuse being called from a different netns than the networkd...
Lennart Poettering [Wed, 26 May 2021 08:39:33 +0000 (10:39 +0200)] 
networkctl: politely refuse being called from a different netns than the networkd instance we talk to

Otherwise things get very confusing since we mix up netens data from our
client side and from the data we retrieve from networkd.

In the long run we should teach networkctl some switch to operate safely
on other netns, and in that case also determine the right networkd
instance for that namespace.

Fixes: #19236
3 years agonetworkd: add bus property exposing network namepace ID we run in
Lennart Poettering [Wed, 26 May 2021 08:37:18 +0000 (10:37 +0200)] 
networkd: add bus property exposing network namepace ID we run in

This is useful for clients to determine whether they are running in the
same network namespace as networkd.

Note that access to /proc/$PID/ns/ is restricted and only permitted to
equally privileged programs. This new bus property is primarily a way to
work around this, so that unprivileged clients can determine the
networkd netns, too.

3 years agoREADME: drop reference to Kinvolk
Lennart Poettering [Wed, 26 May 2021 07:34:14 +0000 (09:34 +0200)] 
README: drop reference to Kinvolk

Kinvolk got bought by Microsoft recently, I doubt they'd even be open
for engineering services like this, hence let's drop the free
advertisement.

3 years agoMerge pull request #19726 from poettering/path-event-symlink
Yu Watanabe [Wed, 26 May 2021 01:51:00 +0000 (10:51 +0900)] 
Merge pull request #19726 from poettering/path-event-symlink

teach .path units to notice events on paths with components that are symlinks

3 years agoMerge pull request #19727 from poettering/pcr-comma
Yu Watanabe [Wed, 26 May 2021 01:37:24 +0000 (10:37 +0900)] 
Merge pull request #19727 from poettering/pcr-comma

Allow PCRs to be separated by "+" instead of ","

3 years agocore/service: do not set zero error to log_unit_debug_errno()
Yu Watanabe [Tue, 25 May 2021 20:02:18 +0000 (05:02 +0900)] 
core/service: do not set zero error to log_unit_debug_errno()

Fixes #19725.

3 years agodns-domain: fix build failure with libidn
Yu Watanabe [Tue, 25 May 2021 19:40:09 +0000 (04:40 +0900)] 
dns-domain: fix build failure with libidn

Follow-up for 319a4f4bc46b230fc660321e99aaac1bc449deea.

Fixes #19723.

3 years agoMerge pull request #19722 from poettering/empty-string-loginctl-man
Luca Boccassi [Tue, 25 May 2021 22:23:42 +0000 (23:23 +0100)] 
Merge pull request #19722 from poettering/empty-string-loginctl-man

document that "loginctl kill-session" takes an empty string + add the same for per-user stuff

3 years agoload-fragment: validate paths properly
Lennart Poettering [Tue, 25 May 2021 15:25:40 +0000 (17:25 +0200)] 
load-fragment: validate paths properly

The comment suggests we validate paths here, but we actually didn't, we
only validated filenames. Let' fix that.

(Note this still lets any kind of paths through, including those with
".." and stuff, this is not a normalization check after all)

3 years agotest: add simple test for PCR list parsing 19727/head
Lennart Poettering [Tue, 25 May 2021 21:40:10 +0000 (23:40 +0200)] 
test: add simple test for PCR list parsing

3 years agotpm2-util: accept empty string for empty PCR list
Lennart Poettering [Tue, 25 May 2021 21:40:01 +0000 (23:40 +0200)] 
tpm2-util: accept empty string for empty PCR list

3 years agotpm2: support "+" as separator for TPM PCR lists
Lennart Poettering [Tue, 25 May 2021 21:26:31 +0000 (23:26 +0200)] 
tpm2: support "+" as separator for TPM PCR lists

Previously, we supported only "," as separator. This adds support for
"+" and makes it the documented choice.

This is to make specifying PCRs in crypttab easier, since commas are
already used there for separating volume options, and needless escaping
sucks.

"," continues to be supported, but in order to keep things minimal not
documented.

Fixe: #19205

3 years agocore: watch paths with symlinks in .path units 19726/head
Lennart Poettering [Tue, 25 May 2021 21:10:36 +0000 (23:10 +0200)] 
core: watch paths with symlinks in .path units

When watching paths that contain symlinks in some element we so far
always only watched the inode they are pointing to, not the symlink
inode itself. Let's fix that and always watch both. We do this by simply
installing the inotify watch once with and once without IN_DONT_FOLLOW.
For non-symlink inodes this just overrides the same watch twice (where
the second one replaces the first), which is has no effect effectively.
For symlinks it means we'll watch both source and destination.

Fixes: #17727
3 years agocore: optimize loop in path_spec_fd_event()
Lennart Poettering [Tue, 25 May 2021 21:09:42 +0000 (23:09 +0200)] 
core: optimize loop in path_spec_fd_event()

Let's avoid the whole loop if it can never match

3 years agocore: log about all errors in path_spec_watch()
Lennart Poettering [Tue, 25 May 2021 21:08:50 +0000 (23:08 +0200)] 
core: log about all errors in path_spec_watch()

So far we logged about most, but not all errors. Adding log to all
errors.

3 years agocore: align path inotify mask table a bit
Lennart Poettering [Tue, 25 May 2021 21:08:26 +0000 (23:08 +0200)] 
core: align path inotify mask table a bit

3 years agoMerge pull request #19322 from poettering/dep-split
Lennart Poettering [Tue, 25 May 2021 20:07:11 +0000 (22:07 +0200)] 
Merge pull request #19322 from poettering/dep-split

core: rework dependency system to be based on atoms + add three new dep types

3 years agoman: documet that loginctl {terminate|kill}-{session|user} take the empty string... 19722/head
Lennart Poettering [Tue, 25 May 2021 15:42:34 +0000 (17:42 +0200)] 
man: documet that loginctl {terminate|kill}-{session|user} take the empty string, optionally

Fixes: #19711
3 years agologinctl: kill calling user when invoked with empty string
Lennart Poettering [Tue, 25 May 2021 15:40:54 +0000 (17:40 +0200)] 
loginctl: kill calling user when invoked with empty string

A suggested by: #19711

3 years agoMerge pull request #19705 from bluca/bpf_dlopen
Lennart Poettering [Tue, 25 May 2021 14:51:16 +0000 (16:51 +0200)] 
Merge pull request #19705 from bluca/bpf_dlopen

core: make libbpf a dlopen() dependency

3 years agotest: add test for OnSuccess= + Uphold= + PropagatesStopTo= + BindsTo= 19322/head
Lennart Poettering [Wed, 14 Apr 2021 15:34:25 +0000 (17:34 +0200)] 
test: add test for OnSuccess= + Uphold= + PropagatesStopTo= + BindsTo=

3 years agotest-engine: ensure atom bits are properly packed
Lennart Poettering [Wed, 14 Apr 2021 20:43:15 +0000 (22:43 +0200)] 
test-engine: ensure atom bits are properly packed

Let's make sure all atoms are actually used, and no holes are left.

3 years agocore: reorder where we add units to queues in unit_notify()
Lennart Poettering [Mon, 26 Apr 2021 20:07:24 +0000 (22:07 +0200)] 
core: reorder where we add units to queues in unit_notify()

This moves all calls that shall do deferred work on detecting whether to
start/stop the unit or dependent units after a unit state change to the
end of the function, to make things easier to read.

So far, these calls were spread all over the function, and
conditionalized needlessly on MANAGER_RELOADING(). This is unnecessary,
since the queues are not dispatched while reloading anyway, and
immediately before acting on a queued unit we'll check if the suggested
operation really makes sense.

The only conditionalizaiton we leave in is on checking the new unit
state itself, since we have that in a local variable anyway.

3 years agocore: change BoundBy= dependency handling to be processed by a deferred work queue
Lennart Poettering [Thu, 8 Apr 2021 20:05:15 +0000 (22:05 +0200)] 
core: change BoundBy= dependency handling to be processed by a deferred work queue

So far StopWhenUnneeded= handling and UpheldBy= handling was already
processed by a queue that is dispatched in a deferred mode of operation
instead of instantly. This changes BoundBy= handling to be processed the
same way.

This should ensure that all *event*-to-job propagation is done directly
from unit_notify(), while all *state*-to-job propagation is done from a
deferred work queue, quite systematically. The work queue is submitted
to by unit_notify() too.

Key really is the difference between event and state: some jobs shall be
queued one-time on events (think: OnFailure= + OnSuccess= and similar),
others shall be queued continuously when a specific state is in effect
(think: UpheldBy=).  The latter cases are usually effect of the
combination of states of a few units (e.g. StopWhenUnneeded= checks
wether any of the Wants=/Requires=/… deps are still up before acting),
and hence it makes sense to trigger them to be run after an individual
unit's state changed, but process them on a queue that runs whenever
there's nothing else to do that ensures the decision on them is only
taken after all jobs/queued IO events are dispatched, and things
settled, so that it makes sense to come to a combined conclusion. If
we'd dispatch this work immediately inside of unit_notify() we'd always
act instantly, even though another event from another unit that is
already queued might make the work unnecessary or invalid.

This is mostly a commit to make things philosophically clean. It does
not add features, but it should make corner cases more robust.

3 years agocore: make unneeded check a bit tighter
Lennart Poettering [Mon, 26 Apr 2021 19:02:31 +0000 (21:02 +0200)] 
core: make unneeded check a bit tighter

Let's not consider a unit unneeded while it is reloading.

Uneeded should be a pretty weak concept: if there's any doubt that
something bit be needed, then assume it is.

3 years agocore: order reverse dep table in same way as enum
Lennart Poettering [Wed, 14 Apr 2021 16:38:42 +0000 (18:38 +0200)] 
core: order reverse dep table in same way as enum

3 years agocore: implement Uphold= dependency type
Lennart Poettering [Wed, 14 Apr 2021 13:24:08 +0000 (15:24 +0200)] 
core: implement Uphold= dependency type

This is like a really strong version of Wants=, that keeps starting the
specified unit if it is ever found inactive.

This is an alternative to Restart= inside a unit, acknowledging the fact
that whether to keep restarting the unit is sometimes not a property of
the unit itself but the state of the system.

This implements a part of what #4263 requests. i.e. there's no
distinction between "always" and "opportunistic". We just dumbly
implement "always" and become active whenever we see no job queued for
an inactive unit that is supposed to be upheld.

3 years agocore: add new OnSuccess= dependency type
Lennart Poettering [Wed, 14 Apr 2021 12:36:15 +0000 (14:36 +0200)] 
core: add new OnSuccess= dependency type

This is similar to OnFailure= but is activated whenever a unit returns
into inactive state successfully.

I was always afraid of adding this, since it effectively allows building
loops and makes our engine Turing complete, but it pretty much already
was it was just hidden.

Given that we have per-unit ratelimits as well as an event loop global
ratelimit I feel safe to add this finally, given it actually is useful.

Fixes: #13386
3 years agocore: use StopPropagatedFrom= as default for .mount → .device unit dependencies
Lennart Poettering [Wed, 14 Apr 2021 09:22:44 +0000 (11:22 +0200)] 
core: use StopPropagatedFrom= as default for .mount → .device unit dependencies

Let's make use of the new dependency type for .mount/.device units,
after all we added it for this purpose.

Fixes: #9869
3 years agocore: add new PropagateStopTo= dependency (and inverse)
Lennart Poettering [Tue, 13 Apr 2021 20:30:31 +0000 (22:30 +0200)] 
core: add new PropagateStopTo= dependency (and inverse)

This takes inspiration from PropagatesReloadTo=, but propagates
stop jobs instead of restart jobs.

This is defined based on exactly two atoms: UNIT_ATOM_PROPAGATE_STOP +
UNIT_ATOM_RETROACTIVE_STOP_ON_STOP. The former ensures that when the
unit the dependency is originating from is stopped based on user
request, we'll propagate the stop job to the target unit, too. In
addition, when the originating unit suddenly stops from external causes
the stopping is propagated too. Note that this does *not* include the
UNIT_ATOM_CANNOT_BE_ACTIVE_WITHOUT atom (which is used by BoundBy=),
i.e. this dependency is purely about propagating "edges" and not
"levels", i.e. it's about propagating specific events, instead of
continious states.

This is supposed to be useful for dependencies between .mount units and
their backing .device units. So far we either placed a BindsTo= or
Requires= dependency between them. The former gave a very clear binding
of the to units together, however was problematic if users establish
mounnts manually with different block device sources than our
configuration defines, as we there might come to the conclusion that the
backing device was absent and thus we need to umount again what the user
mounted. By combining Requires= with the new StopPropagatedFrom= (i.e.
the inverse PropagateStopTo=) we can get behaviour that matches BindsTo=
in every single atom but one: UNIT_ATOM_CANNOT_BE_ACTIVE_WITHOUT is
absent, and hence the level-triggered logic doesn't apply.

Replaces: #11340

3 years agocore: add a reverse dep for OnFailure=
Lennart Poettering [Tue, 13 Apr 2021 18:50:21 +0000 (20:50 +0200)] 
core: add a reverse dep for OnFailure=

Let's add an implicit reverse dep OnFailureOf=. This is exposed via the
bus to make things more debuggable: you can now ask systemd for which
units a specific unit is the failure handler.

OnFailure= was the only dependency type that had no inverse, this fixes
that.

Now that deps are a bit cheaper, it should be OK to add deps that only
serve debug purposes.

3 years agocore: hide cgroup fields in unit_dump() for non-cgroup unit types
Lennart Poettering [Tue, 13 Apr 2021 18:24:15 +0000 (20:24 +0200)] 
core: hide cgroup fields in unit_dump() for non-cgroup unit types

A bunch of properties in the main Unit strcture only make sense for
cgroup units. Let's hide them from unit types that have no relation to
cgroups.

3 years agocore: convert Slice= into a proper dependency (and add a back dependency)
Lennart Poettering [Tue, 13 Apr 2021 16:37:25 +0000 (18:37 +0200)] 
core: convert Slice= into a proper dependency (and add a back dependency)

The slice a unit is assigned to is currently a UnitRef reference. Let's
turn it into a proper dependency, to simplify and clean up code a bit.
Now that new dep types are cheaper, deps should generally be preferable
over everything else, if the concept applies.

This brings one major benefit: we often have to iterate through all unit
a slice contains. So far we iterated through all Before= dependencies of
the slice unit to achieve that, filtering out unrelated units, and
taking benefit of the fact that slice units are implicitly ordered
Before= the units they contain. By making Slice= a proper dependency,
and having an accompanying SliceOf= dependency type, this is much
simpler and nicer as we can directly enumerate the units a slice
contains.

The forward dependency is actually called InSlice internally, since we
already used the UNIT_SLICE name as UnitType field. However, since we
don't intend to expose the dependency to users as dep anyway (we already
have the regular Slice D-Bus property for this) this shouldn't matter.
The SliceOf= implicit dependency type (the erverse of Slice=/InSlice=)
is exported over the bus, to make things a bit nicer to debug and
discoverable.

3 years agocore: add UNIT_GET_SLICE() helper
Lennart Poettering [Mon, 26 Apr 2021 16:14:07 +0000 (18:14 +0200)] 
core: add UNIT_GET_SLICE() helper

In a later commit we intend to move the slice logic to use proper
dependencies instead of a "UnitRef" object. This preparatory commit
drops direct use of the slice UnitRef object for a static inline
function UNIT_GET_SLICE() that is both easier to grok, and allows us to
easily replace its internal implementation later on.

3 years agotest-engine: extend engine test
Lennart Poettering [Tue, 13 Apr 2021 14:50:45 +0000 (16:50 +0200)] 
test-engine: extend engine test

Let's verify that the dependency type to atom mapping is consistent.

Let's also verify that dependency merging works correctly.

3 years agocore: rebreak a few comments
Lennart Poettering [Tue, 13 Apr 2021 15:26:16 +0000 (17:26 +0200)] 
core: rebreak a few comments

3 years agocore: split dependency types into atoms
Lennart Poettering [Tue, 13 Apr 2021 15:25:42 +0000 (17:25 +0200)] 
core: split dependency types into atoms

3 years agohashmap: add helper to test if iterator is still at beginning
Lennart Poettering [Tue, 13 Apr 2021 15:20:58 +0000 (17:20 +0200)] 
hashmap: add helper to test if iterator is still at beginning

3 years agoMerge pull request #19716 from yuwata/sd-netlink-NETLINK_GET_STRICT_CHK
Yu Watanabe [Tue, 25 May 2021 13:38:59 +0000 (22:38 +0900)] 
Merge pull request #19716 from yuwata/sd-netlink-NETLINK_GET_STRICT_CHK

sd-netlink: enable NETLINK_GET_STRICT_CHK socket option to filter out message on kernel

3 years agocore: make libbpf a dlopen() dependency 19705/head
Luca Boccassi [Sun, 23 May 2021 12:04:53 +0000 (13:04 +0100)] 
core: make libbpf a dlopen() dependency

3 years agomeson: look for bpftool in /usr/sbin too
Luca Boccassi [Sun, 23 May 2021 12:43:38 +0000 (13:43 +0100)] 
meson: look for bpftool in /usr/sbin too

On Debian, bpftool is installed in /usr/sbin, which is not in $PATH for
non-root users by default, so finding it fails.
Add a secondary, hard-coded '/usr/sbin/bpftool' after 'bpftool' so that
meson can find it.

https://packages.debian.org/sid/amd64/bpftool/filelist

3 years agotest-parse-argument: Include signal.h
Khem Raj [Tue, 25 May 2021 01:26:27 +0000 (18:26 -0700)] 
test-parse-argument: Include signal.h

Fixes
src/test/test-parse-argument.c:49:29: error: use of undeclared identifier 'SIGABRT'

Signed-off-by: Khem Raj <raj.khem@gmail.com>
3 years agoREADME: point at IRC channel on the new network
Mantas Mikulėnas [Tue, 25 May 2021 10:09:05 +0000 (13:09 +0300)] 
README: point at IRC channel on the new network

3 years agoMerge pull request #19709 from keszybz/sysusers-no-proc
Zbigniew Jędrzejewski-Szmek [Tue, 25 May 2021 06:20:56 +0000 (08:20 +0200)] 
Merge pull request #19709 from keszybz/sysusers-no-proc

Add more logs and make sysusers works in dnf --installroot

3 years agoMerge pull request #19715 from yuwata/network-link-group
Yu Watanabe [Tue, 25 May 2021 04:29:50 +0000 (13:29 +0900)] 
Merge pull request #19715 from yuwata/network-link-group

network: allow to set Group=0 in [Link] section

3 years agosystemctl: avoid crash when pattern expands to empty unit list
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 20:49:56 +0000 (22:49 +0200)] 
systemctl: avoid crash when pattern expands to empty unit list

Fixes #19652.

3 years agoMerge pull request #19713 from nabijaczleweli/bootctlpsko-liter
Yu Watanabe [Mon, 24 May 2021 23:31:38 +0000 (08:31 +0900)] 
Merge pull request #19713 from nabijaczleweli/bootctlpsko-liter

The "obviously good stuff" from #19006 again

3 years agotest: add testcases of filtering on dumping addresses 19716/head
Yu Watanabe [Mon, 24 May 2021 23:15:36 +0000 (08:15 +0900)] 
test: add testcases of filtering on dumping addresses

3 years agolocal-addresses: set ifindex when dump addresses on an interface
Yu Watanabe [Mon, 24 May 2021 21:54:15 +0000 (06:54 +0900)] 
local-addresses: set ifindex when dump addresses on an interface

3 years agonetwork: set ifindex when dump addresses on an interface
Yu Watanabe [Sun, 23 May 2021 14:21:30 +0000 (23:21 +0900)] 
network: set ifindex when dump addresses on an interface

3 years agosd-netlink: set NETLINK_GET_STRICT_CHK socket option
Yu Watanabe [Fri, 21 May 2021 21:03:40 +0000 (06:03 +0900)] 
sd-netlink: set NETLINK_GET_STRICT_CHK socket option

Then kernel filters out unnecessary info on dumping, e.g. RTM_GETADDR.

3 years agosd-netlink: do not set route type and table by default for RTM_GETROUTE or friends
Yu Watanabe [Mon, 24 May 2021 21:49:51 +0000 (06:49 +0900)] 
sd-netlink: do not set route type and table by default for RTM_GETROUTE or friends

3 years agosd-netlink: do not set action for RTM_GETRULE message
Yu Watanabe [Mon, 24 May 2021 13:32:00 +0000 (22:32 +0900)] 
sd-netlink: do not set action for RTM_GETRULE message

Otherwise, when NETLINK_GET_STRICT_CHK socket option is enabled, no rule
will be dumped.

3 years agosd-netlink: do not enable dump flag by default for RTM_GETADDR message
Yu Watanabe [Mon, 24 May 2021 13:47:01 +0000 (22:47 +0900)] 
sd-netlink: do not enable dump flag by default for RTM_GETADDR message

3 years agosd-netlink: do not append prefixlen by default
Yu Watanabe [Mon, 24 May 2021 13:30:44 +0000 (22:30 +0900)] 
sd-netlink: do not append prefixlen by default

Otherwise, when NETLINK_GET_STRICT_CHK socket option is enabled, no
address will be dumped.

3 years agonetwork: add several assertions in conf parsers 19715/head
Yu Watanabe [Mon, 24 May 2021 22:11:36 +0000 (07:11 +0900)] 
network: add several assertions in conf parsers

3 years agonetwork: allow to set Group=0 in [Link] section
Yu Watanabe [Fri, 21 May 2021 05:11:36 +0000 (14:11 +0900)] 
network: allow to set Group=0 in [Link] section

Previously, when a link has already in a numbered group, we cannot
remove the link from the group.

This also fixes the range mentioned in the man page.

3 years agokernel-install: don't erase previous errors if a hook returns 77 19713/head
наб [Tue, 16 Mar 2021 15:59:07 +0000 (16:59 +0100)] 
kernel-install: don't erase previous errors if a hook returns 77

The manpage says that exiting 77 is the same as exiting 0,
then skipping all other hooks, but the behaviour heretofor
was to exit 0, skip all, and behave as if all hooks exited 0

3 years agosysusers: make sysusers work with dnf --installroot 19709/head
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 09:34:16 +0000 (11:34 +0200)] 
sysusers: make sysusers work with dnf --installroot

This is not very pretty, but the code in fs-util.c already provisions for
missing /proc. We ourselves are careful to set up /proc, but not everybody
is and it is important for sysusers to also work where shadow-utils would:
I would like to replace calls to useradd and groupadd in Fedora systemd rpm
scriptlets with a call to sysusers. It has a number of advantages:
- dogfooding
- we don't need to manually duplicate the information from our sysusers
  files to scriptlets
- a dependency on shadow-utils is dropped, which transitively drops dependencies
  on setup and fedora-repos and bunch of other stuff.

We could try to get 'dnf' and 'rpm --root' and such to be reworked,
but not in any reasonable timeframe. And even if this was done, we'd still
want to support older rpm/dnf versions.

3 years agobasic: allow copy_rights() to work without mounted /proc
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 09:33:50 +0000 (11:33 +0200)] 
basic: allow copy_rights() to work without mounted /proc

This will be used in sysusers later on.

3 years agosysusers: add debug lines to failing getent/putent operations
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 08:35:13 +0000 (10:35 +0200)] 
sysusers: add debug lines to failing getent/putent operations

I'm trying to use systemd-sysusers for systemd.rpm itself, and the invocation
in dnf chroot is failing like this:
...
Creating group input with gid 999.
Creating group kvm with gid 36.
Creating group render with gid 998.
Creating group sgx with gid 997.
Creating group systemd-journal with gid 190.
Creating group systemd-network with gid 192.
Creating user systemd-network (systemd Network Management) with uid 192 and gid 192.
Creating group systemd-oom with gid 996.
Creating user systemd-oom (systemd Userspace OOM Killer) with uid 996 and gid 996.
Creating group systemd-resolve with gid 193.
Creating user systemd-resolve (systemd Resolver) with uid 193 and gid 193.
Creating group systemd-timesync with gid 995.
Creating user systemd-timesync (systemd Time Synchronization) with uid 995 and gid 995.
Creating group systemd-coredump with gid 994.
Creating user systemd-coredump (systemd Core Dumper) with uid 994 and gid 994.
Failed to write files: Function not implemented

Let's add more info to make such failures easier to debug.

3 years agosysusers: reduce scope of variables and drop unnecessary initializations
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 07:15:39 +0000 (09:15 +0200)] 
sysusers: reduce scope of variables and drop unnecessary initializations

3 years agokernel-install/90-loaderentry: use install(1) instead of cp/chown/chmod chains
наб [Tue, 16 Mar 2021 15:08:34 +0000 (16:08 +0100)] 
kernel-install/90-loaderentry: use install(1) instead of cp/chown/chmod chains

Also fix typo in error message

3 years agorules.d: Properly quote $env{MODALIAS}
Roshan Shariff [Mon, 24 May 2021 07:30:38 +0000 (01:30 -0600)] 
rules.d: Properly quote $env{MODALIAS}

 Add quotes around use of $env{MODALIAS} in rules.d/80-drivers.rules. The
 modalias can contain whitespace, for example when it is dynamically generated
 using device or vendor IDs.

3 years agoTypo in service.c
Vincent Dechenaux [Mon, 24 May 2021 12:31:06 +0000 (14:31 +0200)] 
Typo in service.c

use => user

3 years agoman: we is OK too -> which is OK too (#19708)
наб [Mon, 24 May 2021 09:39:38 +0000 (11:39 +0200)] 
man: we is OK too -> which is OK too (#19708)

3 years agoMerge pull request #19701 from yuwata/network-udev-do-not-manage-loopback-interfaces
Zbigniew Jędrzejewski-Szmek [Mon, 24 May 2021 05:26:18 +0000 (07:26 +0200)] 
Merge pull request #19701 from yuwata/network-udev-do-not-manage-loopback-interfaces

udev: do not manage loopback interfaces

3 years agoMerge pull request #19704 from yuwata/network-small-fixes
Yu Watanabe [Sun, 23 May 2021 14:02:07 +0000 (23:02 +0900)] 
Merge pull request #19704 from yuwata/network-small-fixes

network: several tiny cleanups

3 years agoudev/net: do not manage loopback interfaces 19701/head
Yu Watanabe [Sun, 23 May 2021 07:59:40 +0000 (16:59 +0900)] 
udev/net: do not manage loopback interfaces

There are nothing we can configure in udevd for loopback interfaces;
no ethertool configs can be applied, MAC address, interface name should
not be touched.

3 years agosd-netlink: rename rtnl_get_link_iftype() -> rtnl_get_link_info() and make it optiona...
Yu Watanabe [Sun, 23 May 2021 07:56:47 +0000 (16:56 +0900)] 
sd-netlink: rename rtnl_get_link_iftype() -> rtnl_get_link_info() and make it optionally return link flags

3 years agoudev/net: rename link_config -> LinkConfig
Yu Watanabe [Sun, 23 May 2021 07:44:03 +0000 (16:44 +0900)] 
udev/net: rename link_config -> LinkConfig

3 years agoudev/net: rename link_config_ctx -> LinkConfigContext
Yu Watanabe [Sun, 23 May 2021 07:37:28 +0000 (16:37 +0900)] 
udev/net: rename link_config_ctx -> LinkConfigContext

3 years agonetwork: IPv6LinkLocalAddressGenerationMode=none disables IPv6LL addressing 19704/head
Yu Watanabe [Fri, 21 May 2021 23:15:00 +0000 (08:15 +0900)] 
network: IPv6LinkLocalAddressGenerationMode=none disables IPv6LL addressing

3 years agonetwork: make link_configure() static
Yu Watanabe [Thu, 20 May 2021 19:02:01 +0000 (04:02 +0900)] 
network: make link_configure() static

3 years agoordered-set: introduce ordered_set_get()
Yu Watanabe [Thu, 20 May 2021 19:01:24 +0000 (04:01 +0900)] 
ordered-set: introduce ordered_set_get()

3 years agoMerge pull request #19681 from yuwata/ethtool-util-log
Yu Watanabe [Sun, 23 May 2021 06:24:46 +0000 (15:24 +0900)] 
Merge pull request #19681 from yuwata/ethtool-util-log

ethtool-util: several cleanups

3 years agoethtool-util: drop unused function 19681/head
Yu Watanabe [Fri, 21 May 2021 19:37:54 +0000 (04:37 +0900)] 
ethtool-util: drop unused function