]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
6 months agonetwork/lldp: do not save LLDP neighbors under /run/systemd
Yu Watanabe [Mon, 26 Feb 2024 06:47:46 +0000 (15:47 +0900)] 
network/lldp: do not save LLDP neighbors under /run/systemd

Now LLDP neighbors are exposed through varlink. Hence, it is not
necessary to save to a file.

6 months agonetworkctl: use varlink method to dump LLDP neighbors
Yu Watanabe [Sun, 25 Feb 2024 06:31:23 +0000 (15:31 +0900)] 
networkctl: use varlink method to dump LLDP neighbors

`networkctl lldp` and `networkctl status INTERFACE` now use varlink
call to the networkd to query LLDP neighbors.

Then, this allows to dump LLDP neighbors in JSON format.

Co-authored-by: Tomáš Pecka <tomas.pecka@cesnet.cz>
6 months agonetworkctl: rename check_netns_match() -> varlink_connect_networkd()
Yu Watanabe [Mon, 26 Feb 2024 01:32:51 +0000 (10:32 +0900)] 
networkctl: rename check_netns_match() -> varlink_connect_networkd()

Then optionally return the varlink connection to the caller.

6 months agonetwork/varlink: add varlink method to get LLDP neighbors
Yu Watanabe [Sun, 25 Feb 2024 05:16:47 +0000 (14:16 +0900)] 
network/varlink: add varlink method to get LLDP neighbors

The method provides the list of LLDP neighbors.

Co-authored-by: Tomáš Pecka <tomas.pecka@cesnet.cz>
6 months agosd-lldp-rx: serialize LLDP neighbors to JSON format
Tomáš Pecka [Thu, 7 Oct 2021 09:16:57 +0000 (11:16 +0200)] 
sd-lldp-rx: serialize LLDP neighbors to JSON format

Add functions serializing LLDP neighbors to JSON (JsonVariant).

The entry contains a chassis id, system name and port id of the remote
neighbor. Also it possibly contains an integer coding the enabled system
capabilities and port description.

6 months agoMerge pull request #31492 from yuwata/icmp6-packet
Yu Watanabe [Fri, 1 Mar 2024 00:18:52 +0000 (09:18 +0900)] 
Merge pull request #31492 from yuwata/icmp6-packet

sd-ndisc: introduce ICMP6Packet and relevant functions, and use them

6 months agofix the value of default shells to use /bin and not /usr/bin
Eli Schwartz [Wed, 21 Feb 2024 02:59:13 +0000 (21:59 -0500)] 
fix the value of default shells to use /bin and not /usr/bin

Partially reverts commit b0d3095fd6cc1791a38f57a1982116b4475244ba.

While it is generally worthwhile for systemd to drop split-usr support,
these options are NOT about split-usr support. The universal location of
POSIX sh is always /bin/sh. Bash is pretty reasonably standardized there
too.

This happens irrespective of /bin being a symlink to /usr/bin.
Ramifications of this change include things like:

- portably running shell scripts that might run very nearly anywhere
- /etc/shells support

For standardization and compatibility reasons, these commands with these
paths need to be consistently found on any system, and thus distros make
sure this works, although even on split-usr systems /usr/bin/bash may be
a symlink to /bin/bash.

Embedding the *access path* of bash as /usr/bin/bash in systemd, for
example in libnss_systemd.so, means that login shells must agree with
systemd on how they invoke the shell. End result: users fail to login
because of access violations.

This cannot be fixed by "fixing PAM" because PAM does not follow
symlinks by design: one example is that it needs to treat rbash as
different from bash.

Fixes: https://bugs.gentoo.org/919749
Signed-off-by: Eli Schwartz <eschwartz93@gmail.com>
6 months agossh-generator: don't do AF_VSOCK stuff if we run in a container
Lennart Poettering [Thu, 29 Feb 2024 17:19:07 +0000 (18:19 +0100)] 
ssh-generator: don't do AF_VSOCK stuff if we run in a container

Tighten our VM check: whether we run in a VM is not enough to do
AF_VSOCK. We also need to check if we are run in a container, because if
we run in a container inside a VM then we should *not* do the AF_VSOCK
stuff, but leave the port free for the VM itself.

As discussed here:

https://github.com/systemd/systemd/pull/31544#issuecomment-1971455401

6 months agoMerge pull request #31544 from mrc0mmand/more-test-tweaks
Luca Boccassi [Thu, 29 Feb 2024 20:29:24 +0000 (20:29 +0000)] 
Merge pull request #31544 from mrc0mmand/more-test-tweaks

A couple of fixlets for TEST-46-HOMED's ssh tests

6 months agossh-generator: handle gracefully if AF_VSOCK works, but /dev/vsock doesn't
Lennart Poettering [Thu, 29 Feb 2024 14:56:24 +0000 (15:56 +0100)] 
ssh-generator: handle gracefully if AF_VSOCK works, but /dev/vsock doesn't

Apparently this case exists, let's handle it gracefully.

Prompted by: https://github.com/systemd/systemd/pull/31544#issuecomment-1971241397

6 months agoRevert "options" rename in json bootctl output
Ludwig Nussel [Tue, 20 Feb 2024 13:25:12 +0000 (14:25 +0100)] 
Revert "options" rename in json bootctl output

Revert the rename from "options" to "finalCmdline" in 122650b4a0
while the bigger https://github.com/systemd/systemd/pull/31339 is still
under review.

6 months agotest: create sshd's runtime directory (Debian variant) 31544/head
Frantisek Sumsal [Thu, 29 Feb 2024 12:06:28 +0000 (13:06 +0100)] 
test: create sshd's runtime directory (Debian variant)

sshd.service on Debian uses RuntimeDirectory=sshd, without which sshd
complains:

[ 4065.834904] sshd[711]: Missing privilege separation directory: /run/sshd
[ 4065.835785] systemd[1]: mysshserver@0-127.0.0.1:4711-127.0.0.1:58232.service: Deactivated successfully.
[ 4065.836433] testsuite-46.sh[708]: kex_exchange_identification: read: Connection reset by peer
[ 4065.836433] testsuite-46.sh[708]: Connection reset by 127.0.0.1 port 4711

Resolves: #31518

6 months agotest: avoid SIGPIPE from ssh | tail -n 1
Frantisek Sumsal [Thu, 29 Feb 2024 10:57:04 +0000 (11:57 +0100)] 
test: avoid SIGPIPE from ssh | tail -n 1

Addresses: https://github.com/systemd/systemd/issues/31518#issuecomment-1968295678

6 months agotest: use ECDSA keys for ssh-related tests
Frantisek Sumsal [Thu, 29 Feb 2024 10:43:57 +0000 (11:43 +0100)] 
test: use ECDSA keys for ssh-related tests

This should make the test faster, especially on machines without
acceleration.

6 months agotest: shell & cleanup cleanup
Frantisek Sumsal [Thu, 29 Feb 2024 10:37:29 +0000 (11:37 +0100)] 
test: shell & cleanup cleanup

6 months agoMerge pull request #31430 from CodethinkLabs/vmspawn/machinectl_vmspawn_support
Luca Boccassi [Thu, 29 Feb 2024 11:27:02 +0000 (11:27 +0000)] 
Merge pull request #31430 from CodethinkLabs/vmspawn/machinectl_vmspawn_support

machinectl: initial vmspawn support

6 months agoDrop build-api support
Michael Biebl [Wed, 28 Feb 2024 15:11:14 +0000 (16:11 +0100)] 
Drop build-api support

It appears the build-api effort at
https://github.com/cgwalters/build-api hasn't really caught on.
systemd appears one of the very few projects actually supporting it.

It does confuse certain tools though. E.g. debhelper by finding a
configure script wrongly assumes this is an autoconf project and thus
needs to be told explicitly that this is in fact a Meson project [1].

Given that Meson is an established build system by now, it appears ok to
drop this compat layer, which will never be fully complete anyway.

[1] https://salsa.debian.org/systemd-team/systemd/-/blob/debian/master/debian/rules?ref_type=heads#L281

6 months agosemaphore: speed up build
Luca Boccassi [Wed, 28 Feb 2024 23:46:15 +0000 (23:46 +0000)] 
semaphore: speed up build

- avoid stripping debug symbols and creating dbgsym packages
- avoid LTO, slows down build a lot
- avoid compressing packages, they are thrown out immediately after use
- avoid building udeb packages, not needed

6 months agodissect-image: fix build
Lennart Poettering [Wed, 28 Feb 2024 21:49:29 +0000 (22:49 +0100)] 
dissect-image: fix build

PRs #31531 and #31524 were merged in quick succession. They are fine
both on their own. But in combination they break the build. Fix it.

6 months agovmspawn: only add to cmdline if tpm was started
Sam Leonard [Wed, 28 Feb 2024 17:39:05 +0000 (17:39 +0000)] 
vmspawn: only add to cmdline if tpm was started

6 months agoMerge pull request #31531 from poettering/verity-userspace-optional
Lennart Poettering [Wed, 28 Feb 2024 21:04:58 +0000 (22:04 +0100)] 
Merge pull request #31531 from poettering/verity-userspace-optional

dissect: make use of userspace verity keyring optional

6 months agoMerge pull request #31524 from poettering/secure-getenv-naming-fix
Luca Boccassi [Wed, 28 Feb 2024 18:01:52 +0000 (18:01 +0000)] 
Merge pull request #31524 from poettering/secure-getenv-naming-fix

change naming order getenv_xyz_secure() → secure_getenv_xyz() to match glibc

6 months agoMerge pull request #31526 from poettering/proc-cmdline-underscorify
Luca Boccassi [Wed, 28 Feb 2024 17:59:46 +0000 (17:59 +0000)] 
Merge pull request #31526 from poettering/proc-cmdline-underscorify

make sure we use underscores for kernel cmdline option names, not dashes

6 months agomachinectl: support vmspawn as a backend 31430/head
Sam Leonard [Tue, 20 Feb 2024 13:14:52 +0000 (13:14 +0000)] 
machinectl: support vmspawn as a backend

6 months agovmspawn: support machined registration
Sam Leonard [Tue, 20 Feb 2024 13:13:16 +0000 (13:13 +0000)] 
vmspawn: support machined registration

6 months agoMerge pull request #31514 from CodethinkLabs/ptyfwd_issues
Lennart Poettering [Wed, 28 Feb 2024 17:36:50 +0000 (18:36 +0100)] 
Merge pull request #31514 from CodethinkLabs/ptyfwd_issues

ptyfwd/terminal-util: improve edge case handling

6 months agodissect: condition usespace verity keyring via kernel cmdline option + env var 31531/head
Lennart Poettering [Wed, 28 Feb 2024 15:16:30 +0000 (16:16 +0100)] 
dissect: condition usespace verity keyring via kernel cmdline option + env var

6 months agodissect-image: add flag for explicitly enabling userspace verity signature checking
Lennart Poettering [Wed, 28 Feb 2024 12:17:03 +0000 (13:17 +0100)] 
dissect-image: add flag for explicitly enabling userspace verity signature checking

let's make userspace verity signature checking optional. This adds a
dissection flag to enable the logic and patches through all our users to
enable it by default, thus effectively not changing anything from the
status quo ante. However, know we have a knob to turn this off in
certain scenarios.

6 months agoenv-util: also rename getenv_uint64_secure() → secure_getenv_uint64() 31524/head
Lennart Poettering [Wed, 28 Feb 2024 13:59:31 +0000 (14:59 +0100)] 
env-util: also rename getenv_uint64_secure() → secure_getenv_uint64()

As in the previous commit, let's not change the order of the words
compared to the underlying glibc API.

6 months agoenv-util: rename getenv_bool_secure() → secure_getenv_bool()
Lennart Poettering [Wed, 28 Feb 2024 13:57:35 +0000 (14:57 +0100)] 
env-util: rename getenv_bool_secure() → secure_getenv_bool()

The glibc API is behind the wrapper is called "secure_getenv()", hence
our wrapper really should keep the order too, otherwise things are just
too confusing.

6 months agoman: add a few missing entries to kernel-command-line man page 31526/head
Lennart Poettering [Wed, 28 Feb 2024 14:33:16 +0000 (15:33 +0100)] 
man: add a few missing entries to kernel-command-line man page

6 months agotree-wide: use "_" rather than "-" as separator in kernel cmdline options
Lennart Poettering [Wed, 28 Feb 2024 14:31:27 +0000 (15:31 +0100)] 
tree-wide: use "_" rather than "-" as separator in kernel cmdline options

Most of our kernel cmdline options use underscores as word separators in
kernel cmdline options, but there were some exceptions. Let's fix those,
and also use underscores.

Since our /proc/cmdline parsers don't distinguish between the two
characters anyway this should not break anything, but makes sure our own
codebase (and in particular docs and log messages) are internally
consistent.

6 months agoMerge pull request #31444 from bluca/semaphore
Frantisek Sumsal [Wed, 28 Feb 2024 14:03:11 +0000 (15:03 +0100)] 
Merge pull request #31444 from bluca/semaphore

semaphore: set upstream build profile and set default branch to debian/master

6 months agoMerge pull request #31293 from ragazenta/netdev_rps
Luca Boccassi [Wed, 28 Feb 2024 13:37:28 +0000 (13:37 +0000)] 
Merge pull request #31293 from ragazenta/netdev_rps

udevd: Add ReceivePacketSteeringCPUMask for systemd.link

6 months agoresolved: exit function if varlink_dispatch() returns > 0
Lennart Poettering [Wed, 28 Feb 2024 10:29:04 +0000 (11:29 +0100)] 
resolved: exit function if varlink_dispatch() returns > 0

varlink_dispatch() returns > 0 if it already replied to the method call,
hence this is reason to return from the handler function, and not
proceed.

6 months agouserbdb: pass log level from main daemon to worker
Lennart Poettering [Wed, 28 Feb 2024 08:43:02 +0000 (09:43 +0100)] 
userbdb: pass log level from main daemon to worker

6 months agoshared/ptyfwd: detect String Terminator or BEL when parsing an OSC sequence 31514/head
Sam Leonard [Tue, 27 Feb 2024 16:08:09 +0000 (16:08 +0000)] 
shared/ptyfwd: detect String Terminator or BEL when parsing an OSC sequence

6 months agoshared/ptyfwd: allow window title but not background color as a valid state
Sam Leonard [Tue, 27 Feb 2024 15:08:37 +0000 (15:08 +0000)] 
shared/ptyfwd: allow window title but not background color as a valid state

Previously if a PTYForward instance had the window title set but no
background color set then it would crash in an assertion as
pty_forward_ansi_process didn't require both to be present.

systemd-vmspawn could get into this state if it failed to get the
terminal tint color.

Now any method that would have called background_color_sequence now
becomes just a NOP if the background color is not set.

This allows keeping the functionality to set window titles even if the
terminal doesn't support the background coloring.

6 months agobasic/terminal-util: accept ST or BEL to end escape sequence queries
Sam Leonard [Tue, 27 Feb 2024 14:35:14 +0000 (14:35 +0000)] 
basic/terminal-util: accept ST or BEL to end escape sequence queries

Currently scan_background_color_response only accepts BEL (\x07) to end
a response, however some terminals (namely kitty in my case) will reply
with the string terminator (ST - https://en.wikipedia.org/wiki/ANSI_escape_code).

This commit changes the behaviour to now accept either ending.

6 months agobasic/terminal-util: add check for poll timeout in get_default_background_color
Sam Leonard [Tue, 27 Feb 2024 11:12:39 +0000 (11:12 +0000)] 
basic/terminal-util: add check for poll timeout in get_default_background_color

Currently the return value 0 is not checked for, this indicates a
timeout and should be handled to prevent doing a blocking read on a file
descriptor with no data ready.

6 months agonetwork/ndisc: drop redundant sd_ndisc_router_get_icmp6_ratelimit()
Yu Watanabe [Tue, 27 Feb 2024 10:31:26 +0000 (19:31 +0900)] 
network/ndisc: drop redundant sd_ndisc_router_get_icmp6_ratelimit()

This effectively reverts 9175002864d8876f375e0df089d142d239282528.

The retrans time field in RA message is for neighbor solicitation,
and the commit d4c8de21a07d015f2f2c787e0735be5e4d02fb3c makes the value
assigned to the correct sysctl property.

Let's deprecate the option, and drop the redundant functions.

6 months agonspawn: minor coding style tweaks to nspawn-register.c
Lennart Poettering [Wed, 28 Feb 2024 10:07:39 +0000 (11:07 +0100)] 
nspawn: minor coding style tweaks to nspawn-register.c

6 months agoMerge pull request #31511 from jamacku/prepare-for-diff-shellcheck
Zbigniew Jędrzejewski-Szmek [Wed, 28 Feb 2024 09:28:56 +0000 (10:28 +0100)] 
Merge pull request #31511 from jamacku/prepare-for-diff-shellcheck

Prepare for new version of Differential ShellCheck & scanning of shell completion scripts

6 months agocgroup-setup: clarify '<=' is evaluated earlier
Yu Watanabe [Wed, 28 Feb 2024 02:51:04 +0000 (11:51 +0900)] 
cgroup-setup: clarify '<=' is evaluated earlier

Follow-up for 31323f21bb0ae7c712f43500c42997c91a6d20bf.

The code is correct, but let's silence Coverity.

Closes CID#1534787.

6 months agotest-network: Add test for rps_cpu_mask option 31293/head
Renjaya Raga Zenta [Fri, 16 Feb 2024 07:01:47 +0000 (14:01 +0700)] 
test-network: Add test for rps_cpu_mask option

6 months agoudevd: Add ReceivePacketSteeringCPUMask for systemd.link
Renjaya Raga Zenta [Tue, 13 Feb 2024 14:15:24 +0000 (21:15 +0700)] 
udevd: Add ReceivePacketSteeringCPUMask for systemd.link

Takes a list of CPU indices or ranges separated by either whitespace or commas. Alternatively,
takes the special value "all" in which will include all available CPUs in the mask.
CPU ranges are specified by the lower and upper CPU indices separated by a dash (e.g. "2-6").
This option may be specified more than once, in which case the specified CPU affinity masks are merged.
If an empty string is assigned, the mask is reset, all assignments prior to this will have no effect.
Defaults to unset and RPS CPU list is unchanged. To disable RPS when it was previously enabled, use the
special value "disable".

Currently, this will set CPU mask to all `rx` queue of matched device (if it has multiple queues).

The `/sys/class/net/<dev>/queues/rx-<n>/rps_cpus` only accept cpu bitmap mask in hexadecimal.

Fix: #30323

6 months agoTODO: fix typo
Yu Watanabe [Wed, 28 Feb 2024 02:46:07 +0000 (11:46 +0900)] 
TODO: fix typo

Follow-up for 666a348d1c98873c55115924751e6f2d3bdb7435.

6 months agotest-network: fix typo
Yu Watanabe [Wed, 28 Feb 2024 02:44:17 +0000 (11:44 +0900)] 
test-network: fix typo

Follow-up for a663ddc04e43a9234e00e47aed98bf2bbeb1573a.

6 months agosd-ndisc: ignore Router Advertisement messages sent by the same interface 31492/head
Yu Watanabe [Mon, 26 Feb 2024 04:26:52 +0000 (13:26 +0900)] 
sd-ndisc: ignore Router Advertisement messages sent by the same interface

6 months agosd-ndisc: use ICMP6Packet and ndisc_option_parse()
Yu Watanabe [Tue, 27 Feb 2024 04:47:01 +0000 (13:47 +0900)] 
sd-ndisc: use ICMP6Packet and ndisc_option_parse()

6 months agosd-ndisc: introduce ndisc_option_parse() helper function
Yu Watanabe [Thu, 22 Feb 2024 22:27:55 +0000 (07:27 +0900)] 
sd-ndisc: introduce ndisc_option_parse() helper function

6 months agoicmp6-packet: introduce ICMP6Packet and several relevant functions
Yu Watanabe [Thu, 22 Feb 2024 07:43:04 +0000 (16:43 +0900)] 
icmp6-packet: introduce ICMP6Packet and several relevant functions

6 months agosemaphore: set upstream build profile and set default branch to debian/master 31444/head
Luca Boccassi [Thu, 22 Feb 2024 10:07:24 +0000 (10:07 +0000)] 
semaphore: set upstream build profile and set default branch to debian/master

Leave TEST_UPSTREAM=1 for now in case we switch branches via the hook

6 months agosemaphore: enable backports to get new dependencies
Luca Boccassi [Thu, 22 Feb 2024 10:18:32 +0000 (10:18 +0000)] 
semaphore: enable backports to get new dependencies

Required due to building with debian/master branch

6 months agotest/README: document how to add a new empty release to the PPA to migrate the CI...
Luca Boccassi [Thu, 22 Feb 2024 14:19:08 +0000 (14:19 +0000)] 
test/README: document how to add a new empty release to the PPA to migrate the CI to a new version

6 months agotest/README: update ubuntu IRC channel for CI help
Luca Boccassi [Thu, 22 Feb 2024 14:15:30 +0000 (14:15 +0000)] 
test/README: update ubuntu IRC channel for CI help

6 months agoinstall: fix compiler warning about empty directive argument
Luca Boccassi [Sat, 24 Feb 2024 12:05:44 +0000 (12:05 +0000)] 
install: fix compiler warning about empty directive argument

On ppc64el with gcc 13.2 on Ubuntu 24.04:

3s In file included from ../src/basic/macro.h:386,
483s                  from ../src/basic/alloc-util.h:10,
483s                  from ../src/shared/install.c:12:
483s ../src/shared/install.c: In function ‘install_changes_dump’:
483s ../src/shared/install.c:432:64: error: ‘%s’ directive argument is null [-Werror=format-overflow=]
483s   432 |                         err = log_error_errno(changes[i].type, "Failed to %s unit, unit %s does not exist.",
483s       |                                                                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
483s ../src/shared/install.c:432:75: note: format string is defined here
483s   432 |                         err = log_error_errno(changes[i].type, "Failed to %s unit, unit %s does not exist.",

6 months agoMerge pull request #31515 from keszybz/small-cleanups-after-review-of-stable-batch
Luca Boccassi [Tue, 27 Feb 2024 20:07:18 +0000 (20:07 +0000)] 
Merge pull request #31515 from keszybz/small-cleanups-after-review-of-stable-batch

Small cleanups after review of stable batch

6 months agoMerge pull request #31442 from YHNdnzj/towards-cgroup-v1-deprecation
Luca Boccassi [Tue, 27 Feb 2024 19:21:35 +0000 (19:21 +0000)] 
Merge pull request #31442 from YHNdnzj/towards-cgroup-v1-deprecation

core: refuse cgroupv1 unless SYSTEMD_CGROUP_ENABLE_LEGACY_FORCE

6 months agotmpfiles.d: avoid deprecated, undocumented syntax (s/F/f+/)
Štěpán Němec [Tue, 27 Feb 2024 13:21:33 +0000 (14:21 +0100)] 
tmpfiles.d: avoid deprecated, undocumented syntax (s/F/f+/)

Fixes: eccebf4b0dcb ("systemd-tmpfiles: deprecate F for f+")
6 months agocore: remove duplicate serialization of `cpu_sched_reset_on_fork`
Antonio Alvarez Feijoo [Tue, 27 Feb 2024 13:28:10 +0000 (14:28 +0100)] 
core: remove duplicate serialization of `cpu_sched_reset_on_fork`

`c->cpu_sched_reset_on_fork` is serialized using
`exec-context-cpu-sched-reset-on-fork` and
`exec-context-cpu-scheduling-reset-on-fork`. Let's keep only the second one, to
serialize the value only if `cpu_sched_set` is true.

6 months agotest: drop route from test-functions
Jan Engelhardt [Tue, 27 Feb 2024 15:05:14 +0000 (16:05 +0100)] 
test: drop route from test-functions

I do not see `route` being exercised anywhere else, everything seems
to be on `ip route` already.

6 months agoshared/pam-util: fix awkward tense in log message 31515/head
Zbigniew Jędrzejewski-Szmek [Tue, 27 Feb 2024 17:32:51 +0000 (18:32 +0100)] 
shared/pam-util: fix awkward tense in log message

6 months agovirt: wrap comment, add missing punctuation
Zbigniew Jędrzejewski-Szmek [Tue, 27 Feb 2024 17:32:21 +0000 (18:32 +0100)] 
virt: wrap comment, add missing punctuation

6 months agoman/sd_bus_service_reconnect.c: normalize whitespace
Zbigniew Jędrzejewski-Szmek [Tue, 27 Feb 2024 17:15:51 +0000 (18:15 +0100)] 
man/sd_bus_service_reconnect.c: normalize whitespace

For man pages, we generally indent with 2 spaces and wrap to ~80 columns.

6 months agoman, shell-completion: fix a few typos/language issues
Štěpán Němec [Tue, 27 Feb 2024 13:31:43 +0000 (14:31 +0100)] 
man, shell-completion: fix a few typos/language issues

6 months agobootspec: don't complain about valid loader.conf settings
Lennart Poettering [Mon, 26 Feb 2024 11:21:01 +0000 (12:21 +0100)] 
bootspec: don't complain about valid loader.conf settings

Let's not complain about various valid loader.conf settings we more
recently added. At the same time let's remove the half-assed userspace
parsers for the fields we actually do support but don't actually really
care about in userspace. There's really no point in storing strings away
that we are not using at all, hence just don#t.

Fixes: #31487
6 months agoci(labeler): add rule for `shell-completion` label
Jan Macku [Tue, 27 Feb 2024 14:54:40 +0000 (15:54 +0100)] 
ci(labeler): add rule for `shell-completion` label

6 months agotest: use socat in unidirectional mode
Frantisek Sumsal [Tue, 27 Feb 2024 10:10:53 +0000 (11:10 +0100)] 
test: use socat in unidirectional mode

By default socat open a separate r/w channel for each specified address,
and terminates the connection after .5s from receiving EOF on _either_
side. And since one side of that connection is an empty stdin, we reach
that EOF pretty quickly. Let's avoid this by using socat in
"reversed unidirectional" mode, where the first address is used only for
writing, and the second one is used only for reading.

Addresses:
  - https://github.com/systemd/systemd/issues/31500
  - https://github.com/systemd/systemd/issues/31493

Follow-up for 3456c89ac26.

6 months agoNEWS: announce cgroup v1 deprecation 31442/head
Mike Yuan [Sun, 25 Feb 2024 02:13:26 +0000 (10:13 +0800)] 
NEWS: announce cgroup v1 deprecation

6 months agomeson: drop default-hierarchy= option, always use unified
Mike Yuan [Sun, 25 Feb 2024 02:05:26 +0000 (10:05 +0800)] 
meson: drop default-hierarchy= option, always use unified

6 months agocore: refuse cgroupv1 unless SYSTEMD_CGROUP_ENABLE_LEGACY_FORCE
Mike Yuan [Sun, 25 Feb 2024 01:10:51 +0000 (09:10 +0800)] 
core: refuse cgroupv1 unless SYSTEMD_CGROUP_ENABLE_LEGACY_FORCE

Also, add a 30s sleep even if cgroup v1 is forced.

Closes #30852

6 months agoshared/cgroup-setup: introduce cg_is_legacy_force_enabled
Mike Yuan [Sun, 25 Feb 2024 01:03:16 +0000 (09:03 +0800)] 
shared/cgroup-setup: introduce cg_is_legacy_force_enabled

6 months agoshared/mount-setup: split out mount_cgroup_legacy_controllers
Mike Yuan [Sun, 25 Feb 2024 01:07:17 +0000 (09:07 +0800)] 
shared/mount-setup: split out mount_cgroup_legacy_controllers

6 months agoshared/mount-setup: minor modernization
Mike Yuan [Thu, 22 Feb 2024 05:03:09 +0000 (13:03 +0800)] 
shared/mount-setup: minor modernization

6 months agocore/cgroup: remove obsolete TODO
Mike Yuan [Sun, 25 Feb 2024 01:00:27 +0000 (09:00 +0800)] 
core/cgroup: remove obsolete TODO

6 months agocore: mark JoinControllers= as DISABLED_LEGACY rather than _CONFIGURATION
Mike Yuan [Thu, 22 Feb 2024 05:06:44 +0000 (13:06 +0800)] 
core: mark JoinControllers= as DISABLED_LEGACY rather than _CONFIGURATION

Follow-up for 143fadf369a18449464956206226761e49be1928

6 months agoci(lint): temporarily disable ShellCheck for bash-completion 31511/head
Jan Macku [Tue, 27 Feb 2024 14:33:36 +0000 (15:33 +0100)] 
ci(lint): temporarily disable ShellCheck for bash-completion

This commit should be reverted once bash completion is in better shape when it comes to ShellCheck.

6 months agofix(SC2148): add ShellCheck directive to bash completion scripts
Jan Macku [Tue, 27 Feb 2024 13:54:49 +0000 (14:54 +0100)] 
fix(SC2148): add ShellCheck directive to bash completion scripts

6 months agoci(lint): exclude zsh completion from ShellCheck
Jan Macku [Tue, 27 Feb 2024 13:26:52 +0000 (14:26 +0100)] 
ci(lint): exclude zsh completion from ShellCheck

zsh is not supported by ShellCheck

6 months agozsh/_journalctl: complete -g, --case-sensitive, 'help' (pseudo-)facility
Štěpán Němec [Tue, 27 Feb 2024 13:36:57 +0000 (14:36 +0100)] 
zsh/_journalctl: complete -g, --case-sensitive, 'help' (pseudo-)facility

6 months agoupdate TODO
Lennart Poettering [Tue, 27 Feb 2024 13:40:31 +0000 (14:40 +0100)] 
update TODO

6 months agosysext: fix typo
Yu Watanabe [Tue, 27 Feb 2024 04:28:02 +0000 (13:28 +0900)] 
sysext: fix typo

6 months agoMerge pull request #31000 from flatcar-hub/krnowak/mutable-overlays
Luca Boccassi [Mon, 26 Feb 2024 16:17:11 +0000 (16:17 +0000)] 
Merge pull request #31000 from flatcar-hub/krnowak/mutable-overlays

systemd-sysext: Implement optional mutability for extensions

6 months agoMerge pull request #31458 from poettering/vmspawn-ptyfwd
Luca Boccassi [Mon, 26 Feb 2024 15:44:50 +0000 (15:44 +0000)] 
Merge pull request #31458 from poettering/vmspawn-ptyfwd

vmspawn: implement TTY logic via ptyfwd

6 months agoMerge pull request #31480 from rpigott/dnssec-maxwork
Luca Boccassi [Mon, 26 Feb 2024 12:26:36 +0000 (12:26 +0000)] 
Merge pull request #31480 from rpigott/dnssec-maxwork

resolved: limit the number of signature validations in a transaction

6 months agonetwork: fix use-after-free in {address,route}_remove_and_cancel()
Yu Watanabe [Mon, 26 Feb 2024 03:09:52 +0000 (12:09 +0900)] 
network: fix use-after-free in {address,route}_remove_and_cancel()

Fixes #31485.

6 months agonspawn: hide ^] hint unless we are interactive mode 31458/head
Lennart Poettering [Fri, 23 Feb 2024 11:30:19 +0000 (12:30 +0100)] 
nspawn: hide ^] hint unless we are interactive mode

The hotkey only works in interactive mode hence don't mislead users
about it.

6 months agovmspawn: use our own ptyfwd code for the console of a VM
Lennart Poettering [Fri, 23 Feb 2024 11:20:55 +0000 (12:20 +0100)] 
vmspawn: use our own ptyfwd code for the console of a VM

Let's make systemd-nspawn use our own ptyfwd logic to handle the TTY by
default.

This adds a new setting --console=, inspired by nspawn's setting of the
same name. If --console=interactive= is used, then we'll do the TTY
dance on our own via ptyfwd, and thus get tinting, our usual hotkey
handling and similar.

Since qemu's own console is useful too, let's keep it around via
--console=native.

FInally, replace the --qemu-gui switch by --console=gui.

6 months agopretty-print: make tinting a bit less aggressive
Lennart Poettering [Fri, 23 Feb 2024 11:20:04 +0000 (12:20 +0100)] 
pretty-print: make tinting a bit less aggressive

6 months agorun: use sd_event_set_signal_exit() at one more place
Lennart Poettering [Fri, 23 Feb 2024 11:19:43 +0000 (12:19 +0100)] 
run: use sd_event_set_signal_exit() at one more place

6 months agonetwork/ndisc: rename Network.ipv6_accept_ra -> Network.ndisc
Yu Watanabe [Fri, 23 Feb 2024 03:41:24 +0000 (12:41 +0900)] 
network/ndisc: rename Network.ipv6_accept_ra -> Network.ndisc

These settings are leated to sd-ndisc and Neighbor Discovery protocol.
Let's use more suitable name.

6 months agoFix: Chuwi UBook X (CWI535) screen rotation matrix
Alexander Zavyalov [Mon, 26 Feb 2024 06:15:02 +0000 (14:15 +0800)] 
Fix: Chuwi UBook X (CWI535) screen rotation matrix

6 months agoukify: Use VERSION_TAG instead of GIT_VERSION
Daan De Meyer [Fri, 23 Feb 2024 15:39:18 +0000 (16:39 +0100)] 
ukify: Use VERSION_TAG instead of GIT_VERSION

GIT_VERSION isn't actually available so use VERSION_TAG instead which
is available.

6 months agoresolved: reduce the maximum nsec3 iterations to 100 31480/head
Ronan Pigott [Sun, 25 Feb 2024 07:23:32 +0000 (00:23 -0700)] 
resolved: reduce the maximum nsec3 iterations to 100

According to RFC9267, the 2500 value is not helpful, and in fact it can
be harmful to permit a large number of iterations. Combined with limits
on the number of signature validations, I expect this will mitigate the
impact of maliciously crafted domains designed to cause excessive
cryptographic work.

6 months agoresolved: limit the number of signature validations in a transaction
Ronan Pigott [Sun, 25 Feb 2024 01:21:24 +0000 (18:21 -0700)] 
resolved: limit the number of signature validations in a transaction

It has been demonstrated that tolerating an unbounded number of dnssec
signature validations is a bad idea. It is easy for a maliciously
crafted DNS reply to contain as many keytag collisions as desired,
causing us to iterate every dnskey and signature combination in vain.

The solution is to impose a maximum number of validations we will
tolerate. While collisions are not hard to craft, I still expect they
are unlikely in the wild so it should be safe to pick fairly small
values.

Here two limits are imposed: one on the maximum number of invalid
signatures encountered per rrset, and another on the total number of
validations performed per transaction.

6 months agoMerge pull request #31490 from yuwata/network-varlink-cleanups
Yu Watanabe [Mon, 26 Feb 2024 06:12:12 +0000 (15:12 +0900)] 
Merge pull request #31490 from yuwata/network-varlink-cleanups

network/varlink: several trivial cleanups

6 months agovarlink/network: reindent methods 31490/head
Yu Watanabe [Mon, 26 Feb 2024 04:42:01 +0000 (13:42 +0900)] 
varlink/network: reindent methods

6 months agonetwork/varlink: downgrade log level about failure in getting netns ID
Yu Watanabe [Mon, 26 Feb 2024 02:30:34 +0000 (11:30 +0900)] 
network/varlink: downgrade log level about failure in getting netns ID

6 months agoformat-table: replace "(size_t) -1" with SIZE_MAX
Yu Watanabe [Mon, 26 Feb 2024 01:37:32 +0000 (10:37 +0900)] 
format-table: replace "(size_t) -1" with SIZE_MAX