]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
4 years agopid1: when reloading configuration, forget old settings
Zbigniew Jędrzejewski-Szmek [Fri, 24 May 2019 07:41:44 +0000 (09:41 +0200)] 
pid1: when reloading configuration, forget old settings

If we had a configuration setting from a configuration file, and it was
removed, we'd still remember the old value, because there's was no mechanism to
"reset" everything, just to assign new values.

Note that the effect of this is limited. For settings that have an "ongoing" effect,
like systemd.confirm_spawn, the new value is simply used. But some settings can only
be set at start.

In particular, CPUAffinity= will be updated if set to a new value, but if
CPUAffinity= is fully removed, it will not be reset, simply because we don't
know what to reset it to. We might have inherited a setting, or we might have
set it ourselves. In principle we could remember the "original" value that was
set when we were executed, but propagate this over reloads and reexecs, but
that would be a lot of work for little gain. So this corner case of removal of
CPUAffinity= is not handled fully, and a reboot is needed to execute the
change. As a work-around, a full mask of CPUAffinity=0-8191 can be specified.

4 years agopid1: don't reset setting from /proc/cmdline upon restart
Zbigniew Jędrzejewski-Szmek [Fri, 24 May 2019 06:59:23 +0000 (08:59 +0200)] 
pid1: don't reset setting from /proc/cmdline upon restart

We have settings which may be set on the kernel command line, and also
in /proc/cmdline (for pid1). The settings in /proc/cmdline have higher priority
of course. When a reload was done, we'd reload just the configuration file,
losing the overrides.

So read /proc/cmdline again during reload.

Also, when initially reading the configuration file when program starts,
don't treat any errors as fatal. The configuration done in there doesn't
seem important enough to refuse boot.

4 years agopid1: parse CPUAffinity= in incremental fashion
Zbigniew Jędrzejewski-Szmek [Fri, 24 May 2019 06:35:51 +0000 (08:35 +0200)] 
pid1: parse CPUAffinity= in incremental fashion

This makes the handling of this option match what we do in unit files. I think
consistency is important here. (As it happens, it is the only option in
system.conf that is "non-atomic", i.e. where there's a list of things which can
be split over multiple assignments. All other options are single-valued, so
there's no issue of how to handle multiple assignments.)

4 years agotest-cpu-set-util: add a smoke test for test_parse_cpu_set_extend()
Zbigniew Jędrzejewski-Szmek [Fri, 24 May 2019 06:50:41 +0000 (08:50 +0200)] 
test-cpu-set-util: add a smoke test for test_parse_cpu_set_extend()

4 years agotest-cpu-set-util: add simple test for cpus_in_affinity_mask()
Zbigniew Jędrzejewski-Szmek [Tue, 21 May 2019 07:01:34 +0000 (09:01 +0200)] 
test-cpu-set-util: add simple test for cpus_in_affinity_mask()

4 years agoMove cpus_in_affinity_mask() to cpu-set-util.[ch]
Zbigniew Jędrzejewski-Szmek [Tue, 28 May 2019 19:28:31 +0000 (21:28 +0200)] 
Move cpus_in_affinity_mask() to cpu-set-util.[ch]

It just seems to fit better there and it's always better to have things
in shared/ rather than basic/.

4 years agoRework cpu affinity parsing
Zbigniew Jędrzejewski-Szmek [Tue, 21 May 2019 06:45:19 +0000 (08:45 +0200)] 
Rework cpu affinity parsing

The CPU_SET_S api is pretty bad. In particular, it has a parameter for the size
of the array, but operations which take two (CPU_EQUAL_S) or even three arrays
(CPU_{AND,OR,XOR}_S) still take just one size. This means that all arrays must
be of the same size, or buffer overruns will occur. This is exactly what our
code would do, if it received an array of unexpected size over the network.
("Unexpected" here means anything different from what cpu_set_malloc() detects
as the "right" size.)

Let's rework this, and store the size in bytes of the allocated storage area.

The code will now parse any number up to 8191, independently of what the current
kernel supports. This matches the kernel maximum setting for any architecture,
to make things more portable.

Fixes #12605.

4 years agoshared/cpu-set-util: remove now-unused CPU_SIZE_TO_NUM()
Zbigniew Jędrzejewski-Szmek [Sun, 19 May 2019 16:08:39 +0000 (18:08 +0200)] 
shared/cpu-set-util: remove now-unused CPU_SIZE_TO_NUM()

4 years agoshared/cpu-set-util: move the part to print cpu-set into a separate function
Zbigniew Jędrzejewski-Szmek [Sun, 19 May 2019 16:02:38 +0000 (18:02 +0200)] 
shared/cpu-set-util: move the part to print cpu-set into a separate function

Also avoid unnecessary asprintf() when we can write to the output area
directly.

4 years agocore/dbus-execute: remove unnecessary initialization
Zbigniew Jędrzejewski-Szmek [Sun, 19 May 2019 14:05:02 +0000 (16:05 +0200)] 
core/dbus-execute: remove unnecessary initialization

4 years agoMerge pull request #12586 from ssahani/route-properties
Yu Watanabe [Sat, 18 May 2019 01:31:37 +0000 (10:31 +0900)] 
Merge pull request #12586 from ssahani/route-properties

Route properties

4 years agonetworkd: route add MPLS TTL propagate 12586/head
Susant Sahani [Thu, 16 May 2019 09:49:08 +0000 (15:19 +0530)] 
networkd: route add MPLS TTL propagate

4 years agoMerge pull request #12593 from AdrianBunk/master
Yu Watanabe [Sat, 18 May 2019 01:25:59 +0000 (10:25 +0900)] 
Merge pull request #12593 from AdrianBunk/master

Small changes from Yocto/musl builds

4 years agonetworkd: FOU netdev add support to configure peer port
Susant Sahani [Thu, 16 May 2019 06:46:19 +0000 (12:16 +0530)] 
networkd: FOU netdev add support to configure peer port

4 years agoshared/varlink: add missing setting of output_buffer_allocated
Zbigniew Jędrzejewski-Szmek [Fri, 17 May 2019 11:35:18 +0000 (13:35 +0200)] 
shared/varlink: add missing setting of output_buffer_allocated

Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14708,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14735,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14725,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14720,
and probably others.

4 years agosd-netlink: add route netlink properties
Susant Sahani [Thu, 16 May 2019 09:48:35 +0000 (15:18 +0530)] 
sd-netlink: add route netlink properties

4 years agosemaphore: switch to Debian experimental packaging branch
Martin Pitt [Thu, 16 May 2019 20:26:21 +0000 (22:26 +0200)] 
semaphore: switch to Debian experimental packaging branch

Debian unstable is frozen for the Debian 9 release, current development
happens in experimental. After the release, this can be switched back to
master, and the branch set through the `$BRANCH` env variable in the
semaphore config.

4 years agofs-util.h: add missing sys/stat include 12593/head
Andrej Valek [Thu, 18 Apr 2019 08:47:11 +0000 (10:47 +0200)] 
fs-util.h: add missing sys/stat include

fix error:
| error: passing argument 5 of 'chase_symlinks_and_stat' from incompatible pointer type [-Werror=incompatible-pointer-types]

4 years agoReplace the legacy ULONG_LONG_MAX with the C99 ULLONG_MAX
Adrian Bunk [Thu, 16 May 2019 19:20:07 +0000 (22:20 +0300)] 
Replace the legacy ULONG_LONG_MAX with the C99 ULLONG_MAX

4 years agosocket-util.h: include string.h
Chen Qi [Mon, 25 Feb 2019 08:37:19 +0000 (16:37 +0800)] 
socket-util.h: include string.h

Fix the following compile error:
src/basic/socket-util.h:187:30: error: implicit declaration of function 'strnlen'; did you mean 'strlen'? [-Werror=implicit-function-declaration]

4 years agosrc/udev/udev-event.c must #include <sys/wait.h>
Adrian Bunk [Thu, 16 May 2019 19:09:46 +0000 (22:09 +0300)] 
src/udev/udev-event.c must #include <sys/wait.h>

Fixes the following build failure with musl:
../git/src/udev/udev-event.c: In function 'spawn_wait':
../git/src/udev/udev-event.c:600:53: error: 'WEXITED' undeclared (first use in this function); did you mean 'WIFEXITED'?
         r = sd_event_add_child(e, NULL, spawn->pid, WEXITED, on_spawn_sigchld, spawn);
                                                     ^~~~~~~

This looks like a bug in udev-event.c that could also have broken
the compilation after some future glibc header reshuffle.

4 years agomeson: stop creating .wants directories for {multi-user,getty}.target (#12569)
Michael Biebl [Fri, 17 May 2019 06:02:46 +0000 (08:02 +0200)] 
meson: stop creating .wants directories for {multi-user,getty}.target (#12569)

Since preset is supposed to be used to enable the services, there is no
need to pre-create those directories either.

Follow-up for #12164

4 years agoudevd: change the default value of udev.children-max (again)
Franck Bui [Mon, 6 May 2019 13:49:23 +0000 (15:49 +0200)] 
udevd: change the default value of udev.children-max (again)

Follow-up for faae64fa3dc22738b3af669579a33055b9d71432, which increased the
default number of udev workers per cpu regardless of how big the system is.

It's not really clear from the commit message if the new number of workers
improved the overall time for the boot process or only reduced the number of
times the max number of children limit was reached (and in this case
5406c36844b3 commit might have been more appropriate in the first place).

But systems with ~1000 CPUs are not rare these days and the worker numbers get
quite large with CPU factor of 8. Spawning more than 2000 workers can't be
healthy on any system, no matter how big.

Indeed the main mistake is the belief that udev is CPU-intensive, and thus the
number of allowed workers has to increase with the number of CPUs. It is not,
at probably has never been. It's I/O bound, and sometimes, bound by resources
such as locks.

This is an argument to:

 - scale only weakly with the number of CPUs, and the rationale to switch back
   to a scale factor C=2 but with a higher offset number which should affect
   systems with a small number of CPUs only. With this patch applied the offset
   is increased from O=8 to O=16.

 - put an absolute maximum limit to make sure no more than 2048 workers are
   spawned no matter how big the system is.

This still provides more workers for the laptop cases (where the number of CPUs
is limited), while avoiding sky-rocketing numbers for big systems.

Note that on most desktop systems, the memory limit will kick in. The following
table collects numbers about children-max. For each scenario, the first column
is the "cpu_limit" limit, and the second number is the minimum amount of memory
for the "cpu_limit" limit to become relevant (with less RAM, memory will limit
the number of children thus "mem_limit" will become the active limit).

       |    > v240    |    < v240     |  this patch   |
 CPUs  | C = 8, O = 8 | C = 2, O = 8  | C = 2, O = 16 |
-------------------------------------------------------
   1   |   16      2  |   10    1.3   |   18       2  |
   2   |   24      3  |   12    1.5   |   20       2  |
   4   |   40      5  |   16      2   |   24       3  |
   8   |   72      9  |   24      3   |   32       4  |
  16   |  136     17  |   40      5   |   48       5  |
  64   |  520     65  |  136     17   |  144      18  |
1024   | 8200   1025  | 2056    263   | 2048     256  |
2048   |16392   2049  | 4104    513   | 2048     256  |

This patch is mainly based on Martin Wilck's analyze and comments.

4 years agoMerge pull request #12515 from evverx/fix-fuzzers-in-local-mode
Zbigniew Jędrzejewski-Szmek [Thu, 16 May 2019 21:04:45 +0000 (23:04 +0200)] 
Merge pull request #12515 from evverx/fix-fuzzers-in-local-mode

travis: make sure the fuzzers can be built in "local" mode

4 years agoMerge pull request #12535 from poettering/color-grey
Zbigniew Jędrzejewski-Szmek [Thu, 16 May 2019 19:15:06 +0000 (21:15 +0200)] 
Merge pull request #12535 from poettering/color-grey

redefine how we select the ANSI color grey

4 years agodocs: add comment about high 32bit range and signed uids
Lennart Poettering [Mon, 13 May 2019 13:23:47 +0000 (15:23 +0200)] 
docs: add comment about high 32bit range and signed uids

4 years agorandom-util: add a longer comment explaining our RDRAND use
Lennart Poettering [Tue, 14 May 2019 13:11:40 +0000 (15:11 +0200)] 
random-util: add a longer comment explaining our RDRAND use

4 years agotests: make docker-run and helper.py happy by not using colons in filenames
Evgeny Vereshchagin [Thu, 16 May 2019 15:53:57 +0000 (17:53 +0200)] 
tests: make docker-run and helper.py happy by not using colons in filenames

This should address https://github.com/google/oss-fuzz/issues/2428

4 years agojournalctl: return a non-zero EC when --grep returns no matches
Frantisek Sumsal [Wed, 15 May 2019 17:28:09 +0000 (19:28 +0200)] 
journalctl: return a non-zero EC when --grep returns no matches

When journalctl is compiled with PCRE2 support, let's return a non-zero
exit code when --grep is used and no match for given pattern is found.
This should allow users to use journalctl --grep in scripts instead of
piping journalctl into grep

Fixes #8152

4 years agovarlink: initialize Varlink with 0
Yu Watanabe [Thu, 16 May 2019 03:35:10 +0000 (12:35 +0900)] 
varlink: initialize Varlink with 0

Closes oss-fuzz#14688.

4 years agoMerge pull request #12378 from rbalint/vt-kbd-reset-check
Lennart Poettering [Thu, 16 May 2019 14:39:38 +0000 (16:39 +0200)] 
Merge pull request #12378 from rbalint/vt-kbd-reset-check

VT kbd reset check

4 years agoMerge pull request #12574 from yuwata/network-mtu-issue-12552
Yu Watanabe [Thu, 16 May 2019 06:25:48 +0000 (08:25 +0200)] 
Merge pull request #12574 from yuwata/network-mtu-issue-12552

network: do not always bump MTU with additional 4bytes

4 years agonetwork: do not use ordered_set_printf() for DOMAINS= or ROUTE_DOMAINS=
Yu Watanabe [Sun, 12 May 2019 20:40:31 +0000 (05:40 +0900)] 
network: do not use ordered_set_printf() for DOMAINS= or ROUTE_DOMAINS=

This partially reverts 5e2a51d588dde4b52c6017ea80b75c16e6e23431.

Fixes #12531.

4 years agoMerge pull request #12549 from yuwata/network-sittun-disable-link-local-addressing...
Yu Watanabe [Thu, 16 May 2019 03:11:05 +0000 (05:11 +0200)] 
Merge pull request #12549 from yuwata/network-sittun-disable-link-local-addressing-12547

network: disable LinkLocalAddressing on sit devices

4 years agoMerge pull request #12576 from ssahani/fou
Yu Watanabe [Thu, 16 May 2019 03:10:35 +0000 (05:10 +0200)] 
Merge pull request #12576 from ssahani/fou

 networkd: FOU tunnel support Local and Peer tunnel addresses

4 years agoMerge pull request #12578 from ssahani/ipvtap
Yu Watanabe [Thu, 16 May 2019 03:01:35 +0000 (05:01 +0200)] 
Merge pull request #12578 from ssahani/ipvtap

networkd: introduce netdev ipvtap

4 years agotest-network: adjust mtu 12574/head
Yu Watanabe [Thu, 16 May 2019 02:49:13 +0000 (11:49 +0900)] 
test-network: adjust mtu

4 years agonetwork: bump MTU bytes only when MTUByte= is not set
Yu Watanabe [Thu, 16 May 2019 02:42:46 +0000 (11:42 +0900)] 
network: bump MTU bytes only when MTUByte= is not set

4 years agonetwork: honor MTUBytes= setting
Yu Watanabe [Wed, 15 May 2019 07:02:06 +0000 (16:02 +0900)] 
network: honor MTUBytes= setting

Closes #12552.

4 years agotest-network: check tunnel netdevs become operstate 'routable' 12549/head
Yu Watanabe [Sun, 12 May 2019 21:55:16 +0000 (06:55 +0900)] 
test-network: check tunnel netdevs become operstate 'routable'

4 years agonetworkd: FOU tunnel support Local and Peer tunnel addresses 12576/head
Susant Sahani [Wed, 15 May 2019 09:17:18 +0000 (14:47 +0530)] 
networkd: FOU tunnel support Local and Peer tunnel addresses

4 years agosd-netlink: Add Fou properties FOU_ATTR_LOCAL_V4/FOU_ATTR_PEER_V4
Susant Sahani [Wed, 15 May 2019 09:16:01 +0000 (14:46 +0530)] 
sd-netlink: Add Fou properties FOU_ATTR_LOCAL_V4/FOU_ATTR_PEER_V4

FOU_ATTR_LOCAL_V6
FOU_ATTR_PEER_V6
FOU_ATTR_PEER_PORT
FOU_ATTR_IFINDEX

4 years agolinux: update headers from current kernel master
Yu Watanabe [Thu, 16 May 2019 01:19:08 +0000 (10:19 +0900)] 
linux: update headers from current kernel master

4 years agotest-network: add a basic test for ipvtap 12578/head
Yu Watanabe [Thu, 16 May 2019 00:48:34 +0000 (09:48 +0900)] 
test-network: add a basic test for ipvtap

4 years agonetworkd: introduce netdev ipvtap
Susant Sahani [Wed, 15 May 2019 10:12:30 +0000 (15:42 +0530)] 
networkd: introduce netdev ipvtap

This patch adds netdev ipvtap that is based on the
IP-VLAN network interface, called ipvtap. An ipvtap device can be created
in the same way as an ipvlan device, using 'kind ipvtap', and then accessed
using the tap user space interface.

4 years agonetwork: disable link local addressing on ipip, gre, sit, and vti netdevs
Yu Watanabe [Sun, 12 May 2019 21:51:54 +0000 (06:51 +0900)] 
network: disable link local addressing on ipip, gre, sit, and vti netdevs

Closes #12547.

4 years agowait-online: ignore -ENODATA on updating link information
Yu Watanabe [Wed, 15 May 2019 04:15:16 +0000 (13:15 +0900)] 
wait-online: ignore -ENODATA on updating link information

When netdev is not created yet, the -ENODATA is returned.

4 years agonetwork: link_check_ready() returns earlier if routes are not configured yet
Yu Watanabe [Sun, 12 May 2019 21:48:31 +0000 (06:48 +0900)] 
network: link_check_ready() returns earlier if routes are not configured yet

link_request_set_routes() calls link_check_ready(), so it is not
necessary to continue that here.

4 years agoMerge pull request #12496 from yuwata/network-on-device-default-route
Yu Watanabe [Wed, 15 May 2019 20:46:25 +0000 (22:46 +0200)] 
Merge pull request #12496 from yuwata/network-on-device-default-route

network: add DefaultRouteOnDevice= setting in [Network] section

4 years agoAdd check to switch VTs only between K_XLATE or K_UNICODE 12378/head
Balint Reczey [Wed, 24 Apr 2019 15:24:02 +0000 (17:24 +0200)] 
Add check to switch VTs only between K_XLATE or K_UNICODE

Switching to K_UNICODE from other than L_XLATE can make the keyboard
unusable and possibly leak keypresses from X.

BugLink: https://launchpad.net/bugs/1803993
4 years agoanalyze: fix help message
Yu Watanabe [Wed, 15 May 2019 08:49:15 +0000 (17:49 +0900)] 
analyze: fix help message

4 years agoman: note that journal does not validate syslog fields
Jan Synacek [Tue, 14 May 2019 08:45:08 +0000 (10:45 +0200)] 
man: note that journal does not validate syslog fields

4 years agoMerge pull request #12565 from zachsmith/fix-log-message-typos
Lennart Poettering [Wed, 15 May 2019 08:50:03 +0000 (10:50 +0200)] 
Merge pull request #12565 from zachsmith/fix-log-message-typos

systemd-sleep: Fix typos in log messages

4 years agoask-password: prevent buffer overrow when reading from keyring
Thadeu Lima de Souza Cascardo [Mon, 13 May 2019 19:58:01 +0000 (16:58 -0300)] 
ask-password: prevent buffer overrow when reading from keyring

When we read from keyring, a temporary buffer is allocated in order to
determine the size needed for the entire data. However, when zeroing that area,
we use the data size returned by the read instead of the lesser size allocate
for the buffer.

That will cause memory corruption that causes systemd-cryptsetup to crash
either when a single large password is used or when multiple passwords have
already been pushed to the keyring.

Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
4 years agotest-network: add a test for IPv4LLRoute= 12496/head
Yu Watanabe [Wed, 15 May 2019 03:43:36 +0000 (12:43 +0900)] 
test-network: add a test for IPv4LLRoute=

4 years agotest-network: add tests for DefaultRouteOnDevice=
Yu Watanabe [Tue, 7 May 2019 04:18:30 +0000 (06:18 +0200)] 
test-network: add tests for DefaultRouteOnDevice=

4 years agonetwork: add DefaultRouteOnDevice= setting in [Network] section
Yu Watanabe [Tue, 14 May 2019 07:43:14 +0000 (16:43 +0900)] 
network: add DefaultRouteOnDevice= setting in [Network] section

When enabled, then default route bound to the interface will be created.
This is useful when adding routes on point-to-point interfaces.

Closes #788.

4 years agonetwork: add missing error check
Yu Watanabe [Tue, 14 May 2019 08:58:20 +0000 (17:58 +0900)] 
network: add missing error check

4 years agonetworkd: do not generate MAC for bridge device.
Susant Sahani [Tue, 14 May 2019 09:45:23 +0000 (11:45 +0200)] 
networkd: do not generate MAC for bridge device.

closes https://github.com/systemd/systemd/issues/12558

4 years agofix typo in partition device message 12565/head
Zach Smith [Tue, 14 May 2019 04:02:06 +0000 (21:02 -0700)] 
fix typo in partition device message

4 years agoMerge pull request #12562 from evverx/timeouts
Frantisek Sumsal [Tue, 14 May 2019 12:19:41 +0000 (14:19 +0200)] 
Merge pull request #12562 from evverx/timeouts

tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly

4 years agotests: make fuzzbuzz.sh compatible with Azure Pipelines again 12515/head
Evgeny Vereshchagin [Tue, 14 May 2019 11:47:56 +0000 (13:47 +0200)] 
tests: make fuzzbuzz.sh compatible with Azure Pipelines again

Now that https://github.com/systemd/systemd/pull/12542 is merged,
fuzzbuzz.sh should be changed a little bit to make it work
on Azure Pipelines. We can no longer assume that source repositories
are added "automagically" by Travis CI or that PATH is set properly.

4 years agoREADME: bring the coverity badge back
Evgeny Vereshchagin [Thu, 9 May 2019 16:21:38 +0000 (18:21 +0200)] 
README: bring the coverity badge back

This reverts commit bf0e551c176fc7aec6b3413d3b311f3e6610df65.

4 years agofuzzers: use -fsanitizer=fuzzer if clang supports it
Evgeny Vereshchagin [Wed, 8 May 2019 22:03:41 +0000 (00:03 +0200)] 
fuzzers: use -fsanitizer=fuzzer if clang supports it

Closes https://github.com/systemd/systemd/issues/10645

4 years agotravis: make sure the fuzzers can be built in "local" mode
Evgeny Vereshchagin [Wed, 8 May 2019 21:23:55 +0000 (23:23 +0200)] 
travis: make sure the fuzzers can be built in "local" mode

4 years agotests: turn on the QEMU part in the Xenial job 12562/head
Evgeny Vereshchagin [Tue, 14 May 2019 11:13:04 +0000 (13:13 +0200)] 
tests: turn on the QEMU part in the Xenial job

The test has been flaky since varlink was merged.
Let's not annoy people with the test that fails more often than not.

It should be OK because the same test is run on Arch.

4 years agotests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly
Evgeny Vereshchagin [Tue, 14 May 2019 11:04:42 +0000 (13:04 +0200)] 
tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly

These were never set explictily because we relied on Travis CI
canceling a job if it's been stuck for 10 minutes. Now that
the script is run on Azure Pipelines (where the default timeout
is 60 minutes) we should limit the script manually to avoid waiting
for an hour for broken jobs to finish.

4 years agoMerge pull request #12542 from evverx/TEST-PIPELINE
Evgeny Vereshchagin [Tue, 14 May 2019 10:49:54 +0000 (13:49 +0300)] 
Merge pull request #12542 from evverx/TEST-PIPELINE

move the FuzzBuzz stage to Azure Pipelines

4 years agoMerge pull request #12536 from poettering/rdrand-workaround-on-amd
Michael Biebl [Tue, 14 May 2019 10:29:41 +0000 (12:29 +0200)] 
Merge pull request #12536 from poettering/rdrand-workaround-on-amd

random-util: eat up bad RDRAND values seen on AMD CPUs

4 years agoREADME: yet another badge. with the status of Pipelines this time. 12542/head
Evgeny Vereshchagin [Tue, 14 May 2019 10:07:41 +0000 (12:07 +0200)] 
README: yet another badge. with the status of Pipelines this time.

4 years agotests: move the FuzzBuzz stage from Travis CI to Azure Pipelines
Evgeny Vereshchagin [Mon, 13 May 2019 00:09:14 +0000 (02:09 +0200)] 
tests: move the FuzzBuzz stage from Travis CI to Azure Pipelines

4 years agotests: make fuzzbuzz.sh compatible with Azure Piplines
Evgeny Vereshchagin [Sun, 12 May 2019 03:57:10 +0000 (05:57 +0200)] 
tests: make fuzzbuzz.sh compatible with Azure Piplines

4 years agotests: try to run fuzzbuzz.sh with Azure Pipelines to see how it fares there
Evgeny Vereshchagin [Sun, 12 May 2019 03:54:25 +0000 (05:54 +0200)] 
tests: try to run fuzzbuzz.sh with Azure Pipelines to see how it fares there

4 years agoMerge pull request #12555 from ssahani/route-properties
Yu Watanabe [Tue, 14 May 2019 07:03:52 +0000 (09:03 +0200)] 
Merge pull request #12555 from ssahani/route-properties

 networkd: route add support to configure fastopen_no_cookie

4 years agonetworkd: DHCP client add support to send RELEASE packet
Susant Sahani [Mon, 13 May 2019 14:30:28 +0000 (20:00 +0530)] 
networkd: DHCP client add support to send RELEASE packet

closes #10820

4 years agofix typo in wakealarm message
Zach Smith [Tue, 14 May 2019 03:01:36 +0000 (20:01 -0700)] 
fix typo in wakealarm message

4 years agonetworkd: route fix coding style 12555/head
Susant Sahani [Tue, 14 May 2019 02:39:54 +0000 (08:09 +0530)] 
networkd: route fix coding style

4 years agonetworkd: route add support to configure fastopen_no_cookie
Susant Sahani [Mon, 13 May 2019 11:15:33 +0000 (16:45 +0530)] 
networkd: route add support to configure fastopen_no_cookie

This patch adds fastopen_no_cookie option to enable/disable TCP fastopen
without a cookie on a per-route basis.

4 years agonetworkd: bridge FDB support more NTF_* flags
Susant Sahani [Wed, 8 May 2019 14:13:21 +0000 (19:43 +0530)] 
networkd: bridge FDB support more NTF_* flags

Add support to configure NTF_ROUTER and NTF_USE

4 years agoMerge pull request #12537 from yuwata/network-link-local-follow-ups
Yu Watanabe [Tue, 14 May 2019 00:22:18 +0000 (02:22 +0200)] 
Merge pull request #12537 from yuwata/network-link-local-follow-ups

network: do not send ipv6 token to kernel

4 years agotravis: move the Xenial phase to Azure Pipelines
Frantisek Sumsal [Mon, 13 May 2019 18:39:02 +0000 (20:39 +0200)] 
travis: move the Xenial phase to Azure Pipelines

4 years agotmpfiles: do not create /run/nologin if PAM is disabled
Xi Ruoyao [Sun, 12 May 2019 06:22:11 +0000 (14:22 +0800)] 
tmpfiles: do not create /run/nologin if PAM is disabled

If systemd is not built with PAM support, systemd-user-sessions.service
won't be built.  On systems without PAM, /run/nologin is useless.  On
systems with PAM but systemd is not built with PAM, /run/nologin won't
be removed and all unprivileged users can't login.

So, we should not create /run/nologin if systemd is built without PAM.

4 years agoman: mention garbage collection of failed conditions
Simon Schricker [Mon, 13 May 2019 08:47:43 +0000 (10:47 +0200)] 
man: mention garbage collection of failed conditions

See discussion:
https://github.com/systemd/systemd/issues/2234

4 years agosd-netlink: support RTAX_FASTOPEN_NO_COOKIE
Susant Sahani [Mon, 13 May 2019 11:14:55 +0000 (16:44 +0530)] 
sd-netlink: support RTAX_FASTOPEN_NO_COOKIE

4 years agoMerge pull request #12546 from jwrdegoede/hwdb-logitech-s510
Lennart Poettering [Mon, 13 May 2019 08:47:07 +0000 (10:47 +0200)] 
Merge pull request #12546 from jwrdegoede/hwdb-logitech-s510

Hwdb logitech s510

4 years agohwdb: Add key mappings for Logitech S510 keyboard and remote control 12546/head
Hans de Goede [Sun, 12 May 2019 10:25:39 +0000 (12:25 +0200)] 
hwdb: Add key mappings for Logitech S510 keyboard and remote control

The S510 keyboard and S510 remote control both have 1 key where the markings
on the key dop not match with the generic Logitech 27MHz keymap.

This commit adds device specific overrides for this.

4 years agohwdb: Update generic Logitech 27 MHz keyboard key mappings
Hans de Goede [Sun, 12 May 2019 10:21:33 +0000 (12:21 +0200)] 
hwdb: Update generic Logitech 27 MHz keyboard key mappings

This commit makes 2 changes to the generic Logitech 27 MHz keyboard keymap:
1. It moves some codes from being keyboard specific to the generic 27MHz
   mapping table, these codes do not conflict on different models and at
   least the c1019 - c101b codes are not only used on the MX3000 keyboard,
   but also on the S510 Remote control
2. Add a bunch of new codes found on the S510 keyboard and S510 remote control

4 years agoMerge pull request #12524 from evverx/UBSan-reports
Evgeny Vereshchagin [Sun, 12 May 2019 02:17:16 +0000 (05:17 +0300)] 
Merge pull request #12524 from evverx/UBSan-reports

tests: stop sending UBsan reports to /dev/null

4 years agotests: hook up the repository to Azure Pipelines 12524/head
Evgeny Vereshchagin [Sun, 12 May 2019 02:04:29 +0000 (04:04 +0200)] 
tests: hook up the repository to Azure Pipelines

The idea is to move a couple of stages from Travis CI (which has been
overloaded since I added the "FuzzBuzz" stage) to Azure Pipelines.

4 years agotravis: make the ASan+UBSan stage compatible with Azure Pipelines
Evgeny Vereshchagin [Sun, 12 May 2019 01:45:29 +0000 (03:45 +0200)] 
travis: make the ASan+UBSan stage compatible with Azure Pipelines

4 years agotests: override a hard-coded timeout that kicks in too early (under ASan+UBSan)
Evgeny Vereshchagin [Fri, 10 May 2019 16:33:35 +0000 (18:33 +0200)] 
tests: override a hard-coded timeout that kicks in too early (under ASan+UBSan)

The test has failed two times today: https://travis-ci.org/systemd/systemd/jobs/530750626
and https://travis-ci.org/systemd/systemd/jobs/530759465.

4 years agotests: redirect the stdout/stderr of journald to a file (under ASan+UBSan)
Evgeny Vereshchagin [Fri, 10 May 2019 00:47:03 +0000 (02:47 +0200)] 
tests: redirect the stdout/stderr of journald to a file (under ASan+UBSan)

Sometimes UBSan sends its reports to stderr regardless of what is specified in log_path
Let's try to catch them by redirecting stderr (and stdout just in case) to a file
See https://github.com/systemd/systemd/pull/12524#issuecomment-491108821

4 years agotests: redirect UBsan reports to a file
Evgeny Vereshchagin [Thu, 9 May 2019 23:00:29 +0000 (01:00 +0200)] 
tests: redirect UBsan reports to a file

so that they won't end up in /dev/null

4 years agoMerge pull request #12516 from yuwata/network-split-link
Yu Watanabe [Sat, 11 May 2019 22:51:23 +0000 (00:51 +0200)] 
Merge pull request #12516 from yuwata/network-split-link

networkd: split networkd-link.c

4 years agonetworkd: Geneve add support for inherit for TTL
Susant Sahani [Sat, 11 May 2019 02:38:57 +0000 (08:08 +0530)] 
networkd: Geneve add support for inherit for TTL

4 years agotest-network: add a tiny test for IPv6Token= 12537/head
Yu Watanabe [Sat, 11 May 2019 22:34:13 +0000 (07:34 +0900)] 
test-network: add a tiny test for IPv6Token=

4 years agonetwork: do not send ipv6 token to kernel
Yu Watanabe [Thu, 9 May 2019 05:39:46 +0000 (14:39 +0900)] 
network: do not send ipv6 token to kernel

We disabled kernel RA support. Then, we should not send
IFLA_INET6_TOKEN.
Thus, we do not need to send IFLA_INET6_ADDR_GEN_MODE twice.

Follow-up for 0e2fdb83bb5e22047e0c7cc058b415d0e93f02cf and
4eb086a38712ea98faf41e075b84555b11b54362.

4 years agonetwork: move MulticastRouter to netdev/bridge.[ch] 12516/head
Yu Watanabe [Fri, 10 May 2019 15:02:58 +0000 (00:02 +0900)] 
network: move MulticastRouter to netdev/bridge.[ch]

4 years agonetwork: drop unnecessary initializations
Yu Watanabe [Fri, 10 May 2019 14:31:20 +0000 (23:31 +0900)] 
network: drop unnecessary initializations

4 years agonetwork: move link_set_bond() to netdev/bond.c
Yu Watanabe [Fri, 10 May 2019 14:29:07 +0000 (23:29 +0900)] 
network: move link_set_bond() to netdev/bond.c