]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
10 months agonetwork/dhcp-pd: use correct flag when DHCPv4 6rd is enabled
Yu Watanabe [Fri, 10 Nov 2023 17:39:33 +0000 (02:39 +0900)] 
network/dhcp-pd: use correct flag when DHCPv4 6rd is enabled

Previously, Link.dhcp6_configured flag was unconditionally used even if
the route is configured based on the DHCPv4 protocol.

Follow-up for a27588d4e7f780243a1828e2af56562f9d779412 and
e49bad0179cb670edeac12ef062887af0ac4c8c5.

10 months agoupdate TODO
Lennart Poettering [Fri, 10 Nov 2023 15:11:01 +0000 (16:11 +0100)] 
update TODO

10 months agofuzz: pass -Dc_args=/-Dcpp_args= to fuzzer targets
Frantisek Sumsal [Fri, 10 Nov 2023 15:38:01 +0000 (16:38 +0100)] 
fuzz: pass -Dc_args=/-Dcpp_args= to fuzzer targets

Prompted by #29972, because right now it's practically impossible to pass
-fno-sanitize=function to the fuzzer targets without some extensive
sed'ing.

This splits both c_args and cpp_args to separate arguments for
tools/meson-build.sh, because the other way would be to use `eval`, so
the space-separated but quoted strings passed to these options are not
split where they shouldn't, and I'd rather avoid using `eval` if
possible.

Also, this switches the positional arguments we pass to `meson setup`,
as they were in incorrect order (docs say it should be buildir followed
by sourcedir); meson is apparently clever enough to figure this out and
switch the arguments around if necessary, so it didn't complain.

10 months agoMerge pull request #29955 from poettering/repart-seal-key
Luca Boccassi [Fri, 10 Nov 2023 16:52:00 +0000 (16:52 +0000)] 
Merge pull request #29955 from poettering/repart-seal-key

repart: add --tpm2-seal-key= support, matching the recently added support cryptenroll has

10 months agoMerge pull request #29947 from poettering/srk-beefup
Luca Boccassi [Fri, 10 Nov 2023 16:47:46 +0000 (16:47 +0000)] 
Merge pull request #29947 from poettering/srk-beefup

tpm2: make SRK easily accessible for use with systemd-cryptenroll --tpm2-device-key=

10 months agohwdb: Add accelerometer data for Librem11 (#29974)
zeroskyx [Fri, 10 Nov 2023 13:32:05 +0000 (14:32 +0100)] 
hwdb: Add accelerometer data for Librem11 (#29974)

10 months agoportablectl: fix detaching when an extension image has been deleted
Luca Boccassi [Thu, 9 Nov 2023 20:22:26 +0000 (20:22 +0000)] 
portablectl: fix detaching when an extension image has been deleted

10 months agoit.po: updates
Daniele Medri [Fri, 10 Nov 2023 09:44:50 +0000 (10:44 +0100)] 
it.po: updates

10 months agopo: Translated using Weblate (Chinese (Traditional) (zh_TW))
Cheng-Chia Tseng [Fri, 10 Nov 2023 11:30:02 +0000 (12:30 +0100)] 
po: Translated using Weblate (Chinese (Traditional) (zh_TW))

Currently translated at 83.7% (190 of 227 strings)

Co-authored-by: Cheng-Chia Tseng <pswo10680@gmail.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/zh_TW/
Translation: systemd/main

10 months agotest: don't pre-process $KERNEL_APPEND
Frantisek Sumsal [Thu, 9 Nov 2023 14:33:31 +0000 (15:33 +0100)] 
test: don't pre-process $KERNEL_APPEND

Let's just rely on the word splitting done by bash instead of messing
with that ourselves, as it's just adding extra complexity to appease one
ShellCheck check. Also, this apparently never worked for the nspawn
stuff anyway, since I forgot to set $IFS to an appropriate value, so it
always put all arguments from $KERNEL_APPEND into a single array item
with an extra newline, which then made systemd sad:

~# readarray arr <<< "foo bar baz"; for i in "${arr[@]}"; do echo "'$i'"; done
'foo bar baz
'
~# make -C test/TEST-45-TIMEDATE/ clean setup run BUILD_DIR=$PWD/build TEST_NO_QEMU=1 KERNEL_APPEND="systemd.log_level=console"
...
~# journalctl -o short-monotonic --no-hostname --file /var/tmp/systemd-tests/systemd-test.XaDX67/system.journal --grep "Failed to parse" -p info --no-pager
[551138.986882] systemd-tmpfiles[21]: Failed to parse log level 'console
[551138.987179] systemd-remount-fs[20]: Failed to parse log level 'console
[551138.993125] systemd-sysusers[23]: Failed to parse log level 'console
[551138.998685] journalctl[29]: Failed to parse log level 'console

Resolves: #29945

10 months agoMerge pull request #29954 from DaanDeMeyer/fix
Luca Boccassi [Thu, 9 Nov 2023 16:30:37 +0000 (16:30 +0000)] 
Merge pull request #29954 from DaanDeMeyer/fix

repart: Fix size round up/round down

10 months agoMerge pull request #29937 from yuwata/network-fix-json-format
Yu Watanabe [Thu, 9 Nov 2023 12:47:37 +0000 (21:47 +0900)] 
Merge pull request #29937 from yuwata/network-fix-json-format

network: fix json output

10 months agoMerge pull request #29783 from CodethinkLabs/vmspawn/notify-socket-forward-pr
Luca Boccassi [Thu, 9 Nov 2023 12:39:10 +0000 (12:39 +0000)] 
Merge pull request #29783 from CodethinkLabs/vmspawn/notify-socket-forward-pr

vmspawn - forward messages to notify socket forward

10 months agobootctl: fix code comment
Antonio Alvarez Feijoo [Thu, 9 Nov 2023 11:07:00 +0000 (12:07 +0100)] 
bootctl: fix code comment

10 months agotest: add one missing assertion
Frantisek Sumsal [Thu, 9 Nov 2023 10:45:35 +0000 (11:45 +0100)] 
test: add one missing assertion

This also makes sure the first signal doesn't "spill" over into the
second check.

10 months agotest: test the new srk extraction functionality 29947/head
Lennart Poettering [Wed, 8 Nov 2023 21:46:44 +0000 (22:46 +0100)] 
test: test the new srk extraction functionality

10 months agoman: update --tpm2-device-key= docs to reference the new ways to get the SRK
Lennart Poettering [Wed, 8 Nov 2023 21:36:28 +0000 (22:36 +0100)] 
man: update --tpm2-device-key= docs to reference the new ways to get the SRK

10 months agoanalyze: add "srk" verb to extract current srk from TPM2 chip
Lennart Poettering [Wed, 8 Nov 2023 21:34:24 +0000 (22:34 +0100)] 
analyze: add "srk" verb to extract current srk from TPM2 chip

This is pretty low-level functionality, hence placed in systemd-analyze.
This is useful for working with systemd-cryptenroll --tpm2-device-key=,
as it acquires the SRK without requiring the full tpm2-tss tool set.

10 months agotpm2-setup: also save the SRK to the file system in TPM2_PUBLIC format
Lennart Poettering [Wed, 8 Nov 2023 21:24:33 +0000 (22:24 +0100)] 
tpm2-setup: also save the SRK to the file system in TPM2_PUBLIC format

We already save it in PEM format, also store it TPM2_PUBLIC format next
to it. This is useful for usage with systemd-cryptenroll's
--tpm2-device-key= switch.

10 months agorepart: add missing --tpm2-pcrlock= in --help text
Lennart Poettering [Thu, 9 Nov 2023 10:01:23 +0000 (11:01 +0100)] 
repart: add missing --tpm2-pcrlock= in --help text

Follow-up for: 404aea7815595c1324947ed7f2a7502b17d3cc01

10 months agoupdate TODO 29955/head
Lennart Poettering [Thu, 9 Nov 2023 09:59:06 +0000 (10:59 +0100)] 
update TODO

10 months agotest: make sure --tpm2-device-key= works correctly in repart, too
Lennart Poettering [Thu, 9 Nov 2023 11:25:07 +0000 (12:25 +0100)] 
test: make sure --tpm2-device-key= works correctly in repart, too

10 months agorepart: add --tpm2-device-key= to repart, too
Lennart Poettering [Wed, 8 Nov 2023 21:42:51 +0000 (22:42 +0100)] 
repart: add --tpm2-device-key= to repart, too

This adds what was added to systemd-cryptenroll recently to
systemd-repart too.

Follow-up for: c3a2a681bed77ce4f9218cd28405994ab5263077

10 months agocryptenroll: slightly reorder things
Lennart Poettering [Wed, 8 Nov 2023 21:37:37 +0000 (22:37 +0100)] 
cryptenroll: slightly reorder things

The tpm2_tpm2b_public_from_pem() invocation only makes sense when we
succeed to load the file from disk, hence we might do this together and
safe a conditionalization.

10 months agotpm2-util: move loading of TPM2B_PUBLIC from disk into tpm2-util.c
Lennart Poettering [Wed, 8 Nov 2023 20:31:45 +0000 (21:31 +0100)] 
tpm2-util: move loading of TPM2B_PUBLIC from disk into tpm2-util.c

No change in behaviour, let's just move this over so that we can reuse
this in repart later (and don't have to export the ugly `sym_` function
pointer for it)

10 months agorepart,cryptenroll: bring tpm2 switches/--help/handling in a single, canonical order
Lennart Poettering [Wed, 8 Nov 2023 19:57:29 +0000 (20:57 +0100)] 
repart,cryptenroll: bring tpm2 switches/--help/handling in a single, canonical order

Let's define the same switches and their backing variables in the same
order, and let's make sure the enums and switches are named the same.

No actual code changes.

10 months agorepart: Fix size round up/round down 29954/head
Daan De Meyer [Thu, 9 Nov 2023 11:10:53 +0000 (12:10 +0100)] 
repart: Fix size round up/round down

Currently, we round minimum sizes up and maximum size down, whereas
it should be the opposite as the current approach means that if the
same size is used for min and max, the min size will end up bigger
than the max size after rounding.

10 months agoSet default value for tools tree
Daan De Meyer [Thu, 9 Nov 2023 11:10:11 +0000 (12:10 +0100)] 
Set default value for tools tree

This allows overriding it from CLI or previous config file if
required.

10 months agovmspawn: update man page to include vsock options 29783/head
Sam Leonard [Thu, 26 Oct 2023 13:03:59 +0000 (14:03 +0100)] 
vmspawn: update man page to include vsock options

10 months agovmspawn: added vsock functionality
Sam Leonard [Tue, 31 Oct 2023 11:35:22 +0000 (11:35 +0000)] 
vmspawn: added vsock functionality

also includes cosmetic fixups from: https://github.com/systemd/systemd/pull/29874

10 months agocore: fix array size in unit_log_resources()
Florian Schmaus [Thu, 9 Nov 2023 07:59:59 +0000 (08:59 +0100)] 
core: fix array size in unit_log_resources()

In 0531bded79dc ("core: include peak memory in unit_log_resources()") new log
messages where added, however the size of the according arrays to hold the
messages was not adjusted.

Fixes: 0531bded79dc ("core: include peak memory in unit_log_resources()")
10 months agoman: document explicitly tha ReadWritePaths= cannot undo superblock read-only settings
Lennart Poettering [Wed, 8 Nov 2023 14:36:43 +0000 (15:36 +0100)] 
man: document explicitly tha ReadWritePaths= cannot undo superblock read-only settings

Fixes: #29266
10 months agoMerge pull request #29949 from mrc0mmand/even-more-ntp-followups
Yu Watanabe [Thu, 9 Nov 2023 06:08:31 +0000 (15:08 +0900)] 
Merge pull request #29949 from mrc0mmand/even-more-ntp-followups

busctl: send READY=1 when we become a monitor

10 months agoMerge pull request #29939 from YHNdnzj/fdopen-independent-mode
Yu Watanabe [Thu, 9 Nov 2023 06:07:11 +0000 (15:07 +0900)] 
Merge pull request #29939 from YHNdnzj/fdopen-independent-mode

basic/fileio: drop O_CREAT in flags passed to fd_reopen

10 months agotest: use Type=notify together with `busctl monitor` 29949/head
Frantisek Sumsal [Wed, 8 Nov 2023 23:00:27 +0000 (00:00 +0100)] 
test: use Type=notify together with `busctl monitor`

Let's use the newly gained feature of `busctl` and start is as a
Type=notify unit, which should make sure the unit is started only after
`busctl` is on the bus listening for messages.

This should help with a race spotted in CIs, where we continued too
early after starting `busctl monitor` and miss the emitted signals:

[   10.914831] testsuite-45.sh[694]: + systemd-run --unit busctl-monitor.service --service-type=exec busctl monitor --json=short '--match=type='\''signal'\'',sender=org.freedesktop.timesync1,member='\''PropertiesChanged'\'',path=/org/free>
[   11.064365] systemd[1]: Starting busctl-monitor.service...
[   11.064903] systemd[1]: Started busctl-monitor.service.
[   11.065192] testsuite-45.sh[740]: Running as unit: busctl-monitor.service; invocation ID: ee44a9d713c34b9a97e3e7f6f4fffe77
...
[   11.069255] testsuite-45.sh[694]: + timedatectl ntp-servers ntp99 10.0.0.1
[   11.077140] systemd-timesyncd[728]: Network configuration changed, trying to establish connection.
[   11.077461] testsuite-45.sh[694]: + assert_networkd_ntp ntp99 10.0.0.1
...
[   11.087418] testsuite-45.sh[694]: + assert_timesyncd_signal '2023-11-08 16:28:48.861455' LinkNTPServers 10.0.0.1
...
[   11.095543] testsuite-45.sh[694]: + for _ in {0..9}
[   11.095543] testsuite-45.sh[694]: + journalctl -q '--since=2023-11-08 16:28:48.861455' -p info _SYSTEMD_UNIT=busctl-monitor.service --grep .
[   11.193258] systemd-journald[375]: Received client request to sync journal.
[   11.112424] testsuite-45.sh[694]: + sleep .5
[   11.160318] dbus-daemon[465]: [system] Connection :1.56 (uid=0 pid=741 comm="/usr/bin/busctl monitor --json=short --match=type=") became a monitor.

Resolves: #29923

10 months agobusctl: send READY=1 when we become a monitor
Frantisek Sumsal [Wed, 8 Nov 2023 22:57:27 +0000 (23:57 +0100)] 
busctl: send READY=1 when we become a monitor

This is pretty much the same stuff as `resolvectl monitor` does, and
allows us to run `busctl monitor` in a Type=notify unit which ensures
that `busctl` is really listening for messages once the unit is marked
as started.

10 months agotest: drop some unnecessary quotes
Frantisek Sumsal [Wed, 8 Nov 2023 22:38:28 +0000 (23:38 +0100)] 
test: drop some unnecessary quotes

10 months agotest-process-util: Handle unprivileged setrlimit success
Dan Nicholson [Wed, 8 Nov 2023 19:15:22 +0000 (12:15 -0700)] 
test-process-util: Handle unprivileged setrlimit success

Currently test_setpriority_closest assumes that setting RLIMIT_NICE to 30 will
fail if the process is unprivileged. If it succeeds, it assumes that the
process is privileged and setresuid and setresgid will succeed.

However, if RLIMIT_NICE is already >= 30, then setrlimit will succeed even if
the process is unprivileged. Guard against that by checking for permission
errors in setresuid and setresgid and skipping the full test if so.

Fixes #22896.

10 months agoMerge pull request #29932 from yuwata/default-network-cleanups
Yu Watanabe [Wed, 8 Nov 2023 20:15:13 +0000 (05:15 +0900)] 
Merge pull request #29932 from yuwata/default-network-cleanups

network: several cleanups for default .network files

10 months agojournalctl: verify sealed log epochs are continuous
Felix Dörre [Fri, 18 Aug 2023 08:00:40 +0000 (10:00 +0200)] 
journalctl: verify sealed log epochs are continuous

Currently empty epochs are not sealed. This allows an attacker to truncate
a sealed log and continue it without any problems showing when verifying the
log.

This partially addresses CVE-2023-31438. One way to extend this change to
address CVE-2023-31438 completely, would be to verify that there is exactly
one seal per epoch (and not sealing when the epoch has not ended yet).

the change also adds a journal-file flag: HEADER_COMPATIBLE_SEALED_CONTINUOUS
this flag indicates that a journal file is sealed continuously and decides whether
any missing crypto epochs should trigger a warning or an error.

10 months agoMerge pull request #29942 from bluca/executor_no_utmp
Luca Boccassi [Wed, 8 Nov 2023 20:01:39 +0000 (20:01 +0000)] 
Merge pull request #29942 from bluca/executor_no_utmp

core: fix build with -Dutmp=false

10 months agoMerge pull request #29927 from yuwata/resolve-mdns-fixlets
Luca Boccassi [Wed, 8 Nov 2023 19:56:31 +0000 (19:56 +0000)] 
Merge pull request #29927 from yuwata/resolve-mdns-fixlets

resolve: several mdns fixlets

10 months agoMerge pull request #29931 from dtardon/udev-remove-property
Luca Boccassi [Wed, 8 Nov 2023 19:55:45 +0000 (19:55 +0000)] 
Merge pull request #29931 from dtardon/udev-remove-property

 udev-manager: actually remove the property

10 months agobasic/fileio: drop O_CREAT before passing flags to fd_reopen 29939/head
Mike Yuan [Wed, 8 Nov 2023 17:43:08 +0000 (01:43 +0800)] 
basic/fileio: drop O_CREAT before passing flags to fd_reopen

Follow-up for 78c21009bfcf0758f9c85dc70ac896c8aab6b535

Fixes #29938

10 months agofd-util: refuse O_CREAT in fd_reopen
Mike Yuan [Wed, 8 Nov 2023 17:10:06 +0000 (01:10 +0800)] 
fd-util: refuse O_CREAT in fd_reopen

O_CREAT doesn't make sense for fd_reopen, since we're
working on an already opened fd. Also, in fd_reopen
we don't handle the mode parameter of open(2), which
means we may get runtime error like #29938.

10 months agoci: add -Dutmp=false coverage 29942/head
Luca Boccassi [Wed, 8 Nov 2023 18:41:09 +0000 (18:41 +0000)] 
ci: add -Dutmp=false coverage

10 months agocore: fix build with -Dutmp=false
Luca Boccassi [Wed, 8 Nov 2023 18:39:48 +0000 (18:39 +0000)] 
core: fix build with -Dutmp=false

10 months agoman: document nameserver= option
Michal Sekletar [Wed, 8 Nov 2023 15:29:25 +0000 (16:29 +0100)] 
man: document nameserver= option

10 months agocore: call mac_init from sd-executor
Luca Boccassi [Wed, 8 Nov 2023 15:24:17 +0000 (15:24 +0000)] 
core: call mac_init from sd-executor

Before the split the SELinux database was inherited via CoW. Since
the split we need to reopen it.

Follow-up for bb5232b6a3b8af

10 months agoupdate TODO
Lennart Poettering [Wed, 8 Nov 2023 17:18:00 +0000 (18:18 +0100)] 
update TODO

10 months agotest-network: verify json format about DHCPv6 client status 29937/head
Yu Watanabe [Wed, 8 Nov 2023 16:31:17 +0000 (01:31 +0900)] 
test-network: verify json format about DHCPv6 client status

10 months agonetwork: fix json generation
Yu Watanabe [Wed, 8 Nov 2023 16:23:12 +0000 (01:23 +0900)] 
network: fix json generation

When the DHCPv6 client is running in the information requesting mode,
then T1 and T2 are not set.

10 months agoman: fix typo
Yu Watanabe [Wed, 8 Nov 2023 15:09:10 +0000 (00:09 +0900)] 
man: fix typo

Follow-up for a9d54de66d62b1180aef845fae2eabde4968dda5.

10 months agonetwork: make 89-ethernet.network match only physical interfaces 29932/head
Yu Watanabe [Wed, 8 Nov 2023 14:05:09 +0000 (23:05 +0900)] 
network: make 89-ethernet.network match only physical interfaces

For safety. We already add similar condition to a generated one:
c25aa6c8acc6d95eaacae7858a7057907d61a25e

10 months agonetwork: use Kind= instead of Driver=
Yu Watanabe [Wed, 8 Nov 2023 13:59:33 +0000 (22:59 +0900)] 
network: use Kind= instead of Driver=

networkd ignores errors in reading driver through ethtool. The kind of
network interface is retrieved through netlink, and networkd checks
checks many failures. So, using Kind= should be safer.

No functional change, just for safety.

10 months agoudev-manager: mark old_key as unused too 29931/head
David Tardon [Wed, 8 Nov 2023 13:52:43 +0000 (14:52 +0100)] 
udev-manager: mark old_key as unused too

10 months agoresolve/mdns: silently ignore Known-Answers only packets 29927/head
Yu Watanabe [Wed, 8 Nov 2023 12:37:04 +0000 (21:37 +0900)] 
resolve/mdns: silently ignore Known-Answers only packets

10 months agoresolve/mdns: allow mDNS queries with truncation flag
Yu Watanabe [Wed, 8 Nov 2023 12:35:12 +0000 (21:35 +0900)] 
resolve/mdns: allow mDNS queries with truncation flag

If the query has many Known-Answers records, then the truncation flag is
set.

Fixes #29168.

10 months agoresolve: tweak logs about truncation
Yu Watanabe [Wed, 8 Nov 2023 12:23:19 +0000 (21:23 +0900)] 
resolve: tweak logs about truncation

10 months agoudev-manager: actually remove the property
David Tardon [Wed, 8 Nov 2023 13:41:28 +0000 (14:41 +0100)] 
udev-manager: actually remove the property

AFAICT there's no reason to keep removed entries in the Hashmap
(although it doesn't break anything either). The only use of this
hashmap is in udev_rule_apply_token_to_event(), which just retrieves the
value using hashmap_get(), hence there's no difference there between an
existing entry with a NULL value and a missing entry.

10 months agoMerge pull request #29926 from poettering/man-fixes
Lennart Poettering [Wed, 8 Nov 2023 13:32:34 +0000 (14:32 +0100)] 
Merge pull request #29926 from poettering/man-fixes

Various documentation fixes

10 months agoupdate TODO 29926/head
Lennart Poettering [Wed, 8 Nov 2023 11:00:19 +0000 (12:00 +0100)] 
update TODO

10 months agoman: document that changing --uid= doesn't work
Lennart Poettering [Wed, 8 Nov 2023 10:57:44 +0000 (11:57 +0100)] 
man: document that changing --uid= doesn't work

Fixes: #28982
10 months agoman: document that Domains=local bind the domain to unicast DNS, not mDNS
Lennart Poettering [Wed, 8 Nov 2023 10:52:53 +0000 (11:52 +0100)] 
man: document that Domains=local bind the domain to unicast DNS, not mDNS

Fixes: #28983
10 months agoservice: say explicitly that people should not use different NonBlocking= settings...
Lennart Poettering [Wed, 8 Nov 2023 10:35:35 +0000 (11:35 +0100)] 
service: say explicitly that people should not use different NonBlocking= settings if they share socket units between multiple service units

Fixes: #29600
10 months agoman: explicitly document compat guarantees of cryptenroll vs. cryptsetup
Lennart Poettering [Wed, 8 Nov 2023 10:21:53 +0000 (11:21 +0100)] 
man: explicitly document compat guarantees of cryptenroll vs. cryptsetup

Fixes: #29743
10 months agoresolve/mdns: split out mdns_make_dummy_packet()
Yu Watanabe [Wed, 8 Nov 2023 11:55:50 +0000 (20:55 +0900)] 
resolve/mdns: split out mdns_make_dummy_packet()

Then, this fixes the following issues:
- if dns_packet_append_zone() for other transaction is failed with
  EMSGSIZE, the previously added key was not removed,
- if dns_transaction_prepare() for other transaction returns 0, then
  we restated the loop without dropping previously appended keys, which
  might not be necessary any more.

10 months agoresolve/mdns: do not append packets without records
Yu Watanabe [Wed, 8 Nov 2023 11:53:39 +0000 (20:53 +0900)] 
resolve/mdns: do not append packets without records

Previously, if we have only max_rr cached entries, then an empty packet
is appended.

Prompted by #29168.

10 months agoman,doc: document some aspects of user record management/homed a bit better
Lennart Poettering [Wed, 8 Nov 2023 10:11:22 +0000 (11:11 +0100)] 
man,doc: document some aspects of user record management/homed a bit better

Fixes: #29759
10 months agoman: be even clearer that tmpfiles user/group/mode are applied on existing inodes
Lennart Poettering [Wed, 8 Nov 2023 09:56:07 +0000 (10:56 +0100)] 
man: be even clearer that tmpfiles user/group/mode are applied on existing inodes

I think it was clear already, but let's be even clearer.

Fixes: #29774
10 months agoman: update COREDUMP_xyz journal fields docs
Lennart Poettering [Wed, 8 Nov 2023 09:48:41 +0000 (10:48 +0100)] 
man: update COREDUMP_xyz journal fields docs

This completes/corrects the documentation for the following fields:

    COREDUMP_CGROUP= - doc where wrong, actually covered COREDUMP_PROC_CGROUP=
    COREDUMP_CMDLINE= → undocumented so far
    COREDUMP_PROC_CGROUP= → docs where there but incorrectly assigned to COREDUMP_CGROUP=
    COREDUMP_PROC_AUXV= → undocumented so far
    COREDUMP_SESSION= → undocumented so far

Fixes: #29832
10 months agoman: add missing unit file section name to example
Lennart Poettering [Wed, 8 Nov 2023 09:31:55 +0000 (10:31 +0100)] 
man: add missing unit file section name to example

Fixes: #29917
10 months agoMerge pull request #29921 from yuwata/sd-dhcp-client-timestamp
Luca Boccassi [Wed, 8 Nov 2023 10:55:11 +0000 (10:55 +0000)] 
Merge pull request #29921 from yuwata/sd-dhcp-client-timestamp

dhcp: further cleanups for timestamp

10 months agoresolvectl: do not sort domain output
Ronan Pigott [Tue, 7 Nov 2023 22:05:02 +0000 (15:05 -0700)] 
resolvectl: do not sort domain output

The order of search domains is important information. We shouldn't
obscure it by sorting the search domains when printing.

Fixes: af781878d598 ("resolvectl: sort domain/nta output")
10 months agotest: retry the property check a couple of times
Frantisek Sumsal [Wed, 8 Nov 2023 08:13:45 +0000 (09:13 +0100)] 
test: retry the property check a couple of times

41e4ce06fe shortened existing sleeps, which resulted in the check being
sometimes done before the property had a chance to update. Let's do what
what we do with the rest of the checks and retry it a couple of times.

Resolves: #29923

10 months agoMerge pull request #28519 from ddstreet/tpm2_external_seal
Lennart Poettering [Wed, 8 Nov 2023 09:28:28 +0000 (10:28 +0100)] 
Merge pull request #28519 from ddstreet/tpm2_external_seal

Update systemd-cryptenroll to enroll TPM using only public key

10 months agosd-dhcp-client,-server: set timestamp based on the time when received a packet 29921/head
Yu Watanabe [Wed, 8 Nov 2023 04:49:03 +0000 (13:49 +0900)] 
sd-dhcp-client,-server: set timestamp based on the time when received a packet

It seems that RFC does not say anything about the timestamp of lease
we should use: time that the client sent a request or received a reply.
In DHCPv6 client and NDisc, we use a timestamp that we receive a packet,
rather than we sent something. So, let's consistently use the same
logic for DHCPv4 client.

By using the logic, we will hopefully not forget to set timestamp again,
which is fixed by 089362976c2a653a77f942bfeb3f61d0e180f078.

10 months agosd-dhcp-client: move packet size check to dhcp_packet_verify_headers()
Yu Watanabe [Wed, 8 Nov 2023 04:15:00 +0000 (13:15 +0900)] 
sd-dhcp-client: move packet size check to dhcp_packet_verify_headers()

No functional change.

10 months agosd-dhcp-client: split out client_verify_message_header()
Yu Watanabe [Wed, 8 Nov 2023 04:04:59 +0000 (13:04 +0900)] 
sd-dhcp-client: split out client_verify_message_header()

This is not necessary to be called when a packet is received through the
RAW socket, but should not hurt anything.

10 months agotest: set working directory even if it is expected that the command fails
Yu Watanabe [Wed, 8 Nov 2023 03:16:26 +0000 (12:16 +0900)] 
test: set working directory even if it is expected that the command fails

Otherwise, parsing may unexpectedly succeeds but fail to run writing
.network files with permission error.

Follow-up for 6bc5de53e8410fdec817300185b7ad72cd7775dd.

10 months agovmspawn: fix memleak
Yu Watanabe [Wed, 8 Nov 2023 05:54:17 +0000 (14:54 +0900)] 
vmspawn: fix memleak

Fixes CID#1523912.

10 months agotree-wide: fix typo
Yu Watanabe [Wed, 8 Nov 2023 05:57:33 +0000 (14:57 +0900)] 
tree-wide: fix typo

10 months agosd-dhcp-client: make client_handle_message() propagate critical error
Yu Watanabe [Wed, 8 Nov 2023 03:56:57 +0000 (12:56 +0900)] 
sd-dhcp-client: make client_handle_message() propagate critical error

Then, stop client in the caller side.

This also makes
- ignore all errors except for resource errors like OOM when FORCERENEW
  is received,
- trigger assertion when an message received even if the client is
  stopped.

This should not change any functionality. Just refactoring.

10 months agoMerge pull request #29910 from yuwata/rapid-commit
Yu Watanabe [Wed, 8 Nov 2023 03:20:17 +0000 (12:20 +0900)] 
Merge pull request #29910 from yuwata/rapid-commit

dhcp: about rapid commit

10 months agoMerge pull request #29913 from keszybz/vmspawn-ci
Luca Boccassi [Tue, 7 Nov 2023 23:35:48 +0000 (23:35 +0000)] 
Merge pull request #29913 from keszybz/vmspawn-ci

Build vmspawn in CI and fix one test failure

10 months agoMerge pull request #29915 from mrc0mmand/ntp-followups
Luca Boccassi [Tue, 7 Nov 2023 22:38:23 +0000 (22:38 +0000)] 
Merge pull request #29915 from mrc0mmand/ntp-followups

timesync: fix PropertiesChanges signals for NTP properties

10 months agovmspawn: add missing include 29913/head
Zbigniew Jędrzejewski-Szmek [Tue, 7 Nov 2023 21:50:37 +0000 (22:50 +0100)] 
vmspawn: add missing include

../src/src/vmspawn/vmspawn-util.c:33:13: error: implicit declaration of function ‘access’; did you mean ‘accept’? [-Werror=implicit-function-declaration]

10 months agoMerge pull request #6763 from kinvolk/iaguis/no-new-privs
Luca Boccassi [Tue, 7 Nov 2023 21:34:49 +0000 (21:34 +0000)] 
Merge pull request #6763 from kinvolk/iaguis/no-new-privs

core: allow using seccomp without no_new_privs when unprivileged

10 months agomeson: enable vmspawn by default in developer mode
Zbigniew Jędrzejewski-Szmek [Tue, 7 Nov 2023 20:51:40 +0000 (21:51 +0100)] 
meson: enable vmspawn by default in developer mode

This should also implicitly enabled vmspawn in CI. It wasn't passing even the
basic tests, which we didn't see, because it needs to be explicitly enabled.

10 months agoman: many fixes systemd-vmspawn(1)
Zbigniew Jędrzejewski-Szmek [Tue, 7 Nov 2023 20:36:46 +0000 (21:36 +0100)] 
man: many fixes systemd-vmspawn(1)

- version information
- indentation and missing tags
- mkosi and qemu don't need root

10 months agoMerge pull request #29914 from yuwata/network-generator
Luca Boccassi [Tue, 7 Nov 2023 20:51:21 +0000 (20:51 +0000)] 
Merge pull request #29914 from yuwata/network-generator

network-generator: several cleanups and follow-ups for dns server handling

10 months agoxdg-autostart: downgrade warning for missing executables
Zbigniew Jędrzejewski-Szmek [Tue, 7 Nov 2023 16:50:51 +0000 (17:50 +0100)] 
xdg-autostart: downgrade warning for missing executables

On a system with a shared home directory, I'm getting a bunch of warnings:

systemd-xdg-autostart-generator[76]: Exec binary '/usr/bin/flatpak' does not exist: No such file or directory
systemd-xdg-autostart-generator[76]: /home/zbyszek/.config/autostart/org.signal.Signal.desktop: not generating unit, error parsing Exec= line: No such file or directory
systemd-xdg-autostart-generator[76]: Exec binary '/usr/bin/flatpak' does not exist: No such file or directory
systemd-xdg-autostart-generator[76]: /home/zbyszek/.config/autostart/im.riot.Riot.desktop: not generating unit, error parsing Exec= line: No such file or directory
systemd-xdg-autostart-generator[76]: Exec binary '/usr/libexec/gnome-tweak-tool-lid-inhibitor' does not exist: No such file or directory
systemd-xdg-autostart-generator[76]: /home/zbyszek/.config/autostart/ignore-lid-switch-tweak.desktop: not generating unit, error parsing Exec= line: No such file or directory
systemd-xdg-autostart-generator[76]: Exec binary '/usr/bin/flatpak' does not exist: No such file or directory
systemd-xdg-autostart-generator[76]: /home/zbyszek/.config/autostart/org.telegram.desktop.desktop: not generating unit, error parsing Exec= line: No such file or directory

This isn't really a problem. Let's just print an info message.

10 months agoMerge pull request #29909 from keszybz/documentation-cleanup
Luca Boccassi [Tue, 7 Nov 2023 20:46:13 +0000 (20:46 +0000)] 
Merge pull request #29909 from keszybz/documentation-cleanup

Two small documentation cleanups

10 months agotimesync: fix PropertiesChanges signals for NTP properties 29915/head
Frantisek Sumsal [Tue, 7 Nov 2023 12:16:05 +0000 (13:16 +0100)] 
timesync: fix PropertiesChanges signals for NTP properties

As in their current form they didn't work at all:

systemd-timesyncd[190115]: Assertion 's' failed at src/libsystemd/sd-event/sd-event.c:3058, function sd_event_source_set_enabled(). Ignoring.
systemd-timesyncd[190115]: Failed to reenable system ntp server change event source!
systemd-timesyncd[190115]: Failed to enable ntp server defer event, ignoring: Invalid argument

This was also pointed out in the post-merge review [0].

Let's address this together with the rest of the comments, and add
some tests to make sure everything works as it should.

Resolves: #28770
Follow-up to: 8f1c446

[0] https://github.com/systemd/systemd/commit/8f1c4469793f2f0281fdfbc20ba4085e20cdd16f#r124147466

10 months agotest: "prettify" the test a bit
Frantisek Sumsal [Tue, 7 Nov 2023 13:35:06 +0000 (14:35 +0100)] 
test: "prettify" the test a bit

10 months agosystemctl: grey out legend
Lennart Poettering [Tue, 7 Nov 2023 16:34:08 +0000 (17:34 +0100)] 
systemctl: grey out legend

The legend is not the primary information, but simply explanatory, hence
grey it out a bit.

This mimics what we do for pcrlock.

10 months agonetwork-generator: refuse unexpected trailing strings 29914/head
Yu Watanabe [Tue, 7 Nov 2023 19:28:02 +0000 (04:28 +0900)] 
network-generator: refuse unexpected trailing strings

10 months agonetwork-generator: allow to specify both IPv4 and IPv6 DNS servers
Yu Watanabe [Tue, 7 Nov 2023 19:09:48 +0000 (04:09 +0900)] 
network-generator: allow to specify both IPv4 and IPv6 DNS servers

Follow-up for 923599523c10d8897551e081e6b00cd8002309c3.

10 months agonetwork-generator: add missing assertions
Yu Watanabe [Tue, 7 Nov 2023 18:56:53 +0000 (03:56 +0900)] 
network-generator: add missing assertions

10 months agonetwork-generator: drop unused family argument
Yu Watanabe [Tue, 7 Nov 2023 18:54:50 +0000 (03:54 +0900)] 
network-generator: drop unused family argument