]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
46 hours agoudev/scsi-id: various typing refactorings 41585/head
Luca Boccassi [Fri, 10 Apr 2026 21:14:45 +0000 (22:14 +0100)] 
udev/scsi-id: various typing refactorings

46 hours agoudev/scsi-id: check for invalid header from kernel buffer
Luca Boccassi [Fri, 10 Apr 2026 18:35:59 +0000 (19:35 +0100)] 
udev/scsi-id: check for invalid header from kernel buffer

46 hours agoudev/scsi-id: check for invalid chars in various fields received from the kernel
Luca Boccassi [Fri, 10 Apr 2026 18:04:04 +0000 (19:04 +0100)] 
udev/scsi-id: check for invalid chars in various fields received from the kernel

Follow-up for 16325b35fa6ecb25f66534a562583ce3b96d52f3

46 hours agonss-systemd: fix off-by-one in nss_pack_group_record_shadow()
Milan Kyselica [Sat, 11 Apr 2026 08:31:16 +0000 (10:31 +0200)] 
nss-systemd: fix off-by-one in nss_pack_group_record_shadow()

nss_count_strv() counts trailing NULL pointers in n. The pointer area
then used (n + 1), reserving one slot more than the size check
accounted for.

Drop the + 1 since n already includes the trailing NULLs, unlike the
non-shadow nss_pack_group_record() where n does not.

Fixes: https://github.com/systemd/systemd/issues/41591
46 hours agoMore assorted coverity fixes (#41601)
Luca Boccassi [Sun, 12 Apr 2026 20:19:12 +0000 (21:19 +0100)] 
More assorted coverity fixes (#41601)

One more round, this time with the help of the claudebot, especially for
spelunking in git blame to find the original commit and writing commit
messages from the list of warnings exported from coverity

Co-developed-by: Claude
[claude@anthropic.com](mailto:claude@anthropic.com)

47 hours agocore: varlink enum for io.systemd.Unit interface (#40972)
Lennart Poettering [Sun, 12 Apr 2026 19:47:54 +0000 (21:47 +0200)] 
core: varlink enum for io.systemd.Unit interface (#40972)

Convert string fields to varlink enums in io.systemd.Unit

Following
https://github.com/systemd/systemd/pull/39391#discussion_r2489599449,
convert all configuration setting fields in the io.systemd.Unit varlink
interface from bare SD_VARLINK_STRING to proper enum types, adding type
safety to the IDL.

This converts ~30 fields across ExecContext, CGroupContext, and
UnitContext, adding 25 new varlink enum types.

Weak compatibility breakage (per
https://github.com/systemd/systemd/pull/40972#issuecomment-4222294318):
Varlink enum identifiers cannot contain - or +, so affected values are
underscorified on the wire. For example, "tty-force" becomes tty_force,
"kmsg+console" becomes kmsg_console.

The full list of affected values:
```
  - ExecInputType: tty-force, tty-fail
  - ExecOutputType: kmsg+console, journal+console
  - ProtectHome: read-only
  - CGroupController: bpf-firewall, bpf-devices, bpf-foreign, bpf-socket-bind, bpf-restrict-network-interfaces, bpf-bind-network-interface
  - CollectMode: inactive-or-failed
  - EmergencyAction: exit-force, reboot-force, reboot-immediate, poweroff-force, poweroff-immediate, soft-reboot, soft-reboot-force, kexec-force, halt-force, halt-immediate
  - JobMode: replace-irreversibly, ignore-dependencies, ignore-requirements, restart-dependencies
```

2 days agotest-json: add iszero_safe guards for float division at index 0 and 1 41601/head
Luca Boccassi [Sat, 11 Apr 2026 21:52:47 +0000 (22:52 +0100)] 
test-json: add iszero_safe guards for float division at index 0 and 1

The existing iszero_safe guards at index 9 and 10 were added to
silence Coverity, but the same division-by-float-zero warning also
applies to the divisions at index 0 (DBL_MIN) and 1 (DBL_MAX).

CID#1587762

Follow-up for 7f133c996c8b1ea9219540ec8f966b64b58d30a6

2 days agodebug-generator: assert breakpoint type is valid before bit shift
Luca Boccassi [Sat, 11 Apr 2026 21:50:39 +0000 (22:50 +0100)] 
debug-generator: assert breakpoint type is valid before bit shift

The BreakpointType enum includes _BREAKPOINT_TYPE_INVALID (-EINVAL),
so Coverity flags the bit shift as potentially using a negative shift
amount. Add an assert to verify the type is in valid range, since the
static table only contains valid entries.

CID#1568482

Follow-up for 1929226e7e649b72f3f9acd464eaac771c00945c

2 days agonss-myhostname: add more INC_SAFE for buffer index accumulation
Luca Boccassi [Sat, 11 Apr 2026 21:15:52 +0000 (22:15 +0100)] 
nss-myhostname: add more INC_SAFE for buffer index accumulation

Use overflow-safe INC_SAFE() instead of raw addition for idx
accumulation, so that Coverity can see the addition is checked.

CID#1548028

Follow-up for a05483a921a518fd283e7cb32dc8c8e816b2ab2c

2 days agouid-range: add assert to prevent underflow in coalesce loop
Luca Boccassi [Sat, 11 Apr 2026 21:04:37 +0000 (22:04 +0100)] 
uid-range: add assert to prevent underflow in coalesce loop

Coverity flags range->n_entries - j as a potential underflow
in the memmove size calculation. Add assert(range->n_entries > 0)
before decrementing n_entries, which holds since the loop condition
guarantees j < n_entries.

CID#1548015

Follow-up for 8dcc66cefc8ab489568c737adcba960756d76a3c

2 days agoSome coverity cleanups (#41596)
Zbigniew Jędrzejewski-Szmek [Sun, 12 Apr 2026 12:00:49 +0000 (14:00 +0200)] 
Some coverity cleanups (#41596)

2 days agoAnother batch of option+verb conversions (#41586)
Zbigniew Jędrzejewski-Szmek [Sun, 12 Apr 2026 11:58:38 +0000 (13:58 +0200)] 
Another batch of option+verb conversions (#41586)

2 days agosd-varlink: scale down the limit of connections per UID to 128
Frantisek Sumsal [Fri, 10 Apr 2026 16:32:33 +0000 (18:32 +0200)] 
sd-varlink: scale down the limit of connections per UID to 128

1024 connections per UID is unnecessarily generous, so let's scale this
down a bit. D-Bus defaults to 256 connections per UID, but let's be even
more conservative and go with 128.

2 days agopo: Translated using Weblate (Arabic)
joo es [Sat, 11 Apr 2026 19:58:51 +0000 (19:58 +0000)] 
po: Translated using Weblate (Arabic)

Currently translated at 100.0% (266 of 266 strings)

Co-authored-by: joo es <jonnyse@users.noreply.translate.fedoraproject.org>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/ar/
Translation: systemd/main

3 days agohomed: drop unnecessary cast to double 41596/head
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 11:09:16 +0000 (13:09 +0200)] 
homed: drop unnecessary cast to double

Coverity was complaining that we we're doing a integer division and then
casting that to double. This was OK, but it was also a bit pointless.
An operation on a double and unsigned promoted the unsigned to a double,
so it's enough if we have a double somewhere as an argument early enough.
Drop noop casts and parens to make the formulas easier to read.

CID#1466459

3 days agofundamental: add ABS_DIFF macro
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 11:06:56 +0000 (13:06 +0200)] 
fundamental: add ABS_DIFF macro

Sometimes we want need to diff two unsigned numbers, which is awkward
because we need to cast them to something with a sign first, if we want
to use abs(). Let's add a helper that avoids the function call
altogether.

Also drop unnecessary parens arounds args which are delimited by commas.

3 days agovarlinkctl: drop bogus variable assignment
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 10:44:03 +0000 (12:44 +0200)] 
varlinkctl: drop bogus variable assignment

Coverity complains that r is overridden. In fact it isn't, but
we shouldn't set it like this anyway. exec_with_listen_fds() already
logs, so we only need to call _exit() if it fails.

CID#1646716

3 days agosd-event: replace dead code path with an assert
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 10:33:44 +0000 (12:33 +0200)] 
sd-event: replace dead code path with an assert

Coverity complains that the -EOPNOTSUPP can never be returned, because
we always have !watch_fallback==locked.

CID#1654169

3 days agocryptsetup: convert to the new option and verb parsers 41586/head
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 09:54:05 +0000 (11:54 +0200)] 
cryptsetup: convert to the new option and verb parsers

The synopisis is moved from the header to the a new section:

  -systemd-cryptsetup attach VOLUME SOURCE-DEVICE [KEY-FILE] [CONFIG]
  -systemd-cryptsetup detach VOLUME
  +systemd-cryptsetup [OPTIONS...] {COMMAND} ...

   Attach or detach an encrypted block device.

  +Commands:
  +  attach VOLUME SOURCE-DEVICE [KEY-FILE] [CONFIG] Attach an encrypted block
  +                                                  device
  +  detach VOLUME                                   Detach an encrypted block
  +                                                  device
  +
  +Options:

I think that's OK… With the autogenerated table that's the natural
thing to do.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agocryptenroll: convert to the new option parser
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 09:26:05 +0000 (11:26 +0200)] 
cryptenroll: convert to the new option parser

--help is the same, apart from linewrapping.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agocryptenroll: reorder option cases to match --help output
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 08:52:38 +0000 (10:52 +0200)] 
cryptenroll: reorder option cases to match --help output

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agocat: convert to the new option parser
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 08:07:49 +0000 (10:07 +0200)] 
cat: convert to the new option parser

--help is identical except for whitespace.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agobsod: convert to the new option parser
Zbigniew Jędrzejewski-Szmek [Sat, 11 Apr 2026 08:03:41 +0000 (10:03 +0200)] 
bsod: convert to the new option parser

Option indentation in --help is fixed.
Description for --continuous is shortened.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agodelta: convert to the new option parser
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 19:41:34 +0000 (21:41 +0200)] 
delta: convert to the new option parser

--help for --diff= is changed from old-style "1|0" to "yes|no".

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agoescape: convert to the new option parser
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 19:28:38 +0000 (21:28 +0200)] 
escape: convert to the new option parser

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agopull: convert to the new option and verb parsers
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 19:21:02 +0000 (21:21 +0200)] 
pull: convert to the new option and verb parsers

Duplicated word in description of --keep-download= is fixed.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agoimportctl: convert to the new option and verb parsers
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 16:28:24 +0000 (18:28 +0200)] 
importctl: convert to the new option and verb parsers

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agoimportctl: fix -N to actually clear keep-download flag
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 16:26:58 +0000 (18:26 +0200)] 
importctl: fix -N to actually clear keep-download flag

-N was clearing and re-setting the same bit in arg_import_flags_mask,
which is a no-op. It should clear the bit in arg_import_flags instead,
matching what --keep-download=no does via SET_FLAG().

3 days agoimport: convert to the new option and verb parsers
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 16:19:41 +0000 (18:19 +0200)] 
import: convert to the new option and verb parsers

--help output is the same.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agobootctl: convert options and verbs to the new macros
Zbigniew Jędrzejewski-Szmek [Sun, 5 Apr 2026 16:04:21 +0000 (18:04 +0200)] 
bootctl: convert options and verbs to the new macros

-RR is formatted using the new OPTION_HELP_ENTRY_VERBATIM so that
we get the same --help as before.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
3 days agoshared/verbs: add _SCOPE variants of the verb macros
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 14:41:54 +0000 (16:41 +0200)] 
shared/verbs: add _SCOPE variants of the verb macros

In some of the large programs, verbs are defined as non-static
functions. To support this cases, add variants of the VERB macros that
take an explicit scope parameter. The existing macros then call those
new macros with scope=static. The variant without static is the
exception, so the macros are "optimized" toward the static helpers.

I also considered allowing VERB macros to be used in different files,
i.e. in different compilation units. This would actually work without
too many changes, except for one caveat: the order in the array would be
unspecified, so we'd need to somehow order the verbs appropriately. This
most likely means that the verbs would need to be annotated with a
number. But that doesn't seem attractive at all: we'd need to coordinate
changes in different files. So just listing the verbs in one file seems
like least bad option.

3 days agoshared/options: add option to generate a help line for custom option format
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 17:06:00 +0000 (19:06 +0200)] 
shared/options: add option to generate a help line for custom option format

Sometimes we want to document what -RR or -vv does or some other
special thing. Let's allow this by (ab-)using long_code pointer
to store a preformatted string.

3 days agojson-stream: fix NULL pointer passed to memcpy on first read with INPUT_SENSITIVE
Luca Boccassi [Sat, 11 Apr 2026 00:41:13 +0000 (01:41 +0100)] 
json-stream: fix NULL pointer passed to memcpy on first read with INPUT_SENSITIVE

When JSON_STREAM_INPUT_SENSITIVE is set before the first read,
input_buffer is NULL, input_buffer_size is 0, and input_buffer_index
is 0. The old condition '!INPUT_SENSITIVE && index == 0' would route
this case into the else branch which calls memcpy() with a NULL source
pointer, which is undefined behavior even when the length is zero, and
is caught by UBSan.

Fix by checking input_buffer_index == 0 first, then allowing the
GREEDY_REALLOC fast path also when input_buffer_size == 0, since
there is no sensitive data to protect from realloc() copying in that
case. The else branch is now only entered when there is actual data
to copy (input_buffer_size > 0), guaranteeing input_buffer is
non-NULL.

Follow-up for 6b1a59d59426cdda56648b00394addde2d454418

3 days agocore: fix EBUSY on restart and clean of delegated services
Nandakumar Raghavan [Tue, 24 Mar 2026 13:42:42 +0000 (13:42 +0000)] 
core: fix EBUSY on restart and clean of delegated services

When a service is configured with Delegate=yes and DelegateSubgroup=sub,
the delegated container may write domain controllers (e.g. "pids") into the
service cgroup's cgroup.subtree_control via its cgroupns root. On container
exit the stale controllers remain, and on service restart clone3() with
CLONE_INTO_CGROUP fails with EBUSY because placing a process into a cgroup
that has domain controllers in subtree_control violates the no-internal-
processes rule. The same issue affects systemctl clean, where cg_attach()
fails with EBUSY for the same reason.

Add unit_cgroup_disable_all_controllers() helper in cgroup.c that clears
stale controllers via cg_enable(mask=0) and updates cgroup_enabled_mask to
keep internal tracking in sync. Call it from service_start() and
service_clean() right before spawning, so that resource control is preserved
for any lingering processes from the previous invocation as long as possible.

3 days agosd-json: limit the stack depth during parsing as well
Frantisek Sumsal [Fri, 10 Apr 2026 15:20:03 +0000 (17:20 +0200)] 
sd-json: limit the stack depth during parsing as well

3 days agoDefine array cleanup funcs through macros (#41559)
Zbigniew Jędrzejewski-Szmek [Fri, 10 Apr 2026 19:45:14 +0000 (21:45 +0200)] 
Define array cleanup funcs through macros (#41559)

4 days agosd-json: add JsonStream transport-layer module and migrate sd-varlink
Daan De Meyer [Thu, 9 Apr 2026 14:54:21 +0000 (14:54 +0000)] 
sd-json: add JsonStream transport-layer module and migrate sd-varlink

Introduces JsonStream, a generic transport layer for JSON-line message
exchange over a pair of file descriptors. It owns the input/output
buffers, SCM_RIGHTS fd passing, the deferred output queue, the
read/write/parse step functions, sd-event integration (input/output/time
event sources), the idle timeout machinery, and peer credential caching,
but knows nothing about the specific JSON protocol on top — the consumer
drives its state machine via phase/dispatch callbacks supplied at
construction.

sd-varlink is reworked to delegate the entire transport layer to a
JsonStream owned by sd_varlink. The varlink struct drops every
transport-related field (input/output buffers and fds, output queue,
fd-passing state, ucred/pidfd cache, prefer_read/write fallback, idle
timeout, description, event sources) — all of that lives in JsonStream
now. What remains in sd_varlink is the varlink-protocol state machine
(state, n_pending, current/previous/sentinel, server linkage, peer
credentials accounting, exec_pidref, the varlink-specific quit and defer
sources) and a thin wrapper layer over the JsonStream API. The
should_disconnect / get_timeout / get_events / wait helpers all live in
JsonStream now and are driven by a JsonStreamPhase the consumer reports
via its phase callback.

4 days agonews: new record about strings vs enums in varlink 40972/head
Ivan Kruglov [Fri, 10 Apr 2026 13:12:26 +0000 (06:12 -0700)] 
news: new record about strings vs enums in varlink

4 days agotest: add core-specific varlink enum sync test
Ivan Kruglov [Thu, 5 Mar 2026 11:05:00 +0000 (03:05 -0800)] 
test: add core-specific varlink enum sync test

Add test-varlink-idl-unit that validates all varlink enum types in
io.systemd.Unit match their corresponding C string tables. This
catches drift between varlink IDL enum definitions and internal
enum values.

Uses core_test_template since it links against libcore for access
to the string table lookup functions.

ExecOutput uses TEST_IDL_ENUM_TO_STRING only because the '+' in
'kmsg+console' doesn't survive the underscorify/dashify round-trip.

4 days agodocs: beef up SECURITY.md rules for reporting
Luca Boccassi [Fri, 10 Apr 2026 13:13:27 +0000 (14:13 +0100)] 
docs: beef up SECURITY.md rules for reporting

With yeswehack.com suspended due to funding issues for triagers being
worked out, reports on GH are starting to pile up. Explicitly define
some ground rules to avoid noise and time wasting.

4 days agovarlink: add enum types for configuration settings in io.systemd.Unit
Ivan Kruglov [Thu, 5 Mar 2026 10:31:24 +0000 (02:31 -0800)] 
varlink: add enum types for configuration settings in io.systemd.Unit

Define proper varlink enum types for unit configuration settings that
are part of the user-facing API (values users/clients can select).
This replaces SD_VARLINK_STRING with SD_VARLINK_DEFINE_FIELD_BY_TYPE
for these fields, giving them strong type semantics in the IDL.

Enum types added for ExecContext (ExecInputType, ExecOutputType,
ExecUtmpMode, ExecPreserveMode, ExecKeyringMode, MemoryTHP,
ProtectProc, ProcSubset, ProtectSystem, ProtectHome, PrivateTmp,
PrivateUsers, ProtectHostname, ProtectControlGroups, PrivatePIDs,
PrivateBPF), CGroupContext (CGroupDevicePolicy, ManagedOOMMode,
ManagedOOMPreference, CGroupPressureWatch, NFTSetSource, NFProto,
BPFCGroupAttachType, CGroupController), and UnitContext (CollectMode,
EmergencyAction, JobMode).

Engine-reported runtime state fields (Type, LoadState, ActiveState,
FreezerState, SubState, UnitFileState) remain as strings since only
the engine selects those values.

4 days agovarious: use DEFINE_ARRAY_FREE_FUNC 41559/head
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 21:04:47 +0000 (23:04 +0200)] 
various: use DEFINE_ARRAY_FREE_FUNC

4 days agosysupdate: use DEFINE_POINTER_ARRAY_FREE_FUNC, rename func
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 21:04:19 +0000 (23:04 +0200)] 
sysupdate: use DEFINE_POINTER_ARRAY_FREE_FUNC, rename func

4 days agoshared/tar-util: use DEFINE_ARRAY_FREE_FUNC, rename funcs
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 21:03:47 +0000 (23:03 +0200)] 
shared/tar-util: use DEFINE_ARRAY_FREE_FUNC, rename funcs

4 days agosd-journal: use NormalCasing for struct
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 20:56:07 +0000 (22:56 +0200)] 
sd-journal: use NormalCasing for struct

4 days agonsresourced: use DEFINE_ARRAY_FREE_FUNC, make func static and rename
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 20:49:41 +0000 (22:49 +0200)] 
nsresourced: use DEFINE_ARRAY_FREE_FUNC, make func static and rename

4 days agolibsystemd-network: use DEFINE_POINTER_ARRAY_FREE_FUNC, rename cleanup function
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 20:40:21 +0000 (22:40 +0200)] 
libsystemd-network: use DEFINE_POINTER_ARRAY_FREE_FUNC, rename cleanup function

4 days agolibsystemd-network: use DEFINE_ARRAY_FREE_FUNC, rename cleanup func
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 20:34:34 +0000 (22:34 +0200)] 
libsystemd-network: use DEFINE_ARRAY_FREE_FUNC, rename cleanup func

4 days agostub: use DEFINE_ARRAY_FREE_FUNC
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 16:30:37 +0000 (18:30 +0200)] 
stub: use DEFINE_ARRAY_FREE_FUNC

4 days agoAdd DEFINE_ARRAY_FREE_FUNC and mount_image_free_array
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 16:27:34 +0000 (18:27 +0200)] 
Add DEFINE_ARRAY_FREE_FUNC and mount_image_free_array

This is similar to DEFINE_POINTER_ARRAY_FREE_FUNC, but one
pointer chase less. The name of the outer and inner functions are
specified separately. The inner function does not free, so it'll
be generally something like 'foo_done', but the outer function
does free, so it can be called 'foo_array_free'.

4 days agoAdd DEFINE_POINTER_ARRAY_FREE_FUNC and conf_file_free_array
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 15:56:09 +0000 (17:56 +0200)] 
Add DEFINE_POINTER_ARRAY_FREE_FUNC and conf_file_free_array

As mentioned in the grandfather commit, I want to use the _many
suffix for freeing of the contents of an array, so the functions
to free the array to get the suffix _array.

4 days agofirewall-util: use DEFINE_ARRAY_DONE_FUNC for netlink message cleanup
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 15:37:41 +0000 (17:37 +0200)] 
firewall-util: use DEFINE_ARRAY_DONE_FUNC for netlink message cleanup

Replace the open-coded netlink_message_unref_many() function and its
DEFINE_TRIVIAL_CLEANUP_FUNC wrapper with DEFINE_ARRAY_DONE_FUNC.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
4 days agoAdd DEFINE_ARRAY_DONE_FUNC
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 15:17:32 +0000 (17:17 +0200)] 
Add DEFINE_ARRAY_DONE_FUNC

This is a helper macro that defines a function to drop elements of an
array but not the array itself. I used the "_many" suffix because it
most closely matches what happens here: we are calling the cleanup
function a bunch of times.

4 days agotest: extract varlink IDL test helpers into shared header
Ivan Kruglov [Thu, 5 Mar 2026 10:30:39 +0000 (02:30 -0800)] 
test: extract varlink IDL test helpers into shared header

Move the TEST_IDL_ENUM_TO_STRING, TEST_IDL_ENUM_FROM_STRING, and
TEST_IDL_ENUM macros along with test_enum_to_string_name() from
test-varlink-idl.c into test-varlink-idl-util.h so they can be
reused by other test files.

4 days agoUpdate TODO
Lennart Poettering [Fri, 10 Apr 2026 12:46:17 +0000 (14:46 +0200)] 
Update TODO

4 days agomeson: Check if files returned by git ls-files actually exist
Daan De Meyer [Fri, 10 Apr 2026 06:14:53 +0000 (08:14 +0200)] 
meson: Check if files returned by git ls-files actually exist

Otherwise you run into errors such as:

"""
../meson.build:2899:28: ERROR: File src/test/test-loop-util.c does not exist.
"""

when deleting a file in git without staging the deletion.

4 days agosd-bus: don't overallocate the message buffer
Frantisek Sumsal [Fri, 10 Apr 2026 08:52:21 +0000 (10:52 +0200)] 
sd-bus: don't overallocate the message buffer

newa(t, n) already allocates sizeof(t) * n bytes, so previously we'd
actually allocate sizeof(t) * sizeof(t) * n bytes, which is ~16x more
(on x86_64) that we actually needed.

This is probably an oversight from a tree-wide change in
6e9417f5b4f29938fab1eee2b5edf596cc580452 that replaced alloca() with
newa().

Follow-up for 6e9417f5b4f29938fab1eee2b5edf596cc580452.

4 days agologind: add io.systemd.Shutdown varlink interface (#41229)
Lennart Poettering [Fri, 10 Apr 2026 10:29:32 +0000 (12:29 +0200)] 
logind: add io.systemd.Shutdown varlink interface (#41229)

The shutdown interface is currently only exposed via dbus. This PR
adds a comparable varlink implementation. It is inspired by the existing
dbus methods and implements PowerOff, Reboot, Halt, Kexec, SoftReboot
as varlink methods on a new io.systemd.Shutdown interface.

It is (intentional) simpler than the dbus for now, i.e. no Can* yet,
mostly
because I want to get feedback first (happy to do that in a followup).

The only real difficulty here is what to do about
verify_shutdown_creds()
as this is needed by both dbus and varlink and its dbus only. I went for
an ugly but (hopefully) pragmatic choice (see the commit message for
details). But I can totally understand if a refactor instead is
preferred.

4 days agoHelp users with incorrect / permission bits (#41431)
Lennart Poettering [Fri, 10 Apr 2026 10:25:07 +0000 (12:25 +0200)] 
Help users with incorrect / permission bits (#41431)

This error causes the computer to pass the emergency.target and go to
graphical.target.
Then, your window manager will have problems because it cant access any
directories, your network manager wont startup the network. In my case,
the screen just goes black. Ideally, you'd get an error message
explaining this edge scenario that's occuring to you, and an emergency
shell that makes it easy to run the necessary chmod 0755 / to proceed
with booting. IDK not sure if this is the correct way to implement this,
sorry it's my first contribution.

I ran
`meson test -C build`
and got

Ok:                1806
Fail:              26
Skipped:           25
on my cloned systemd repo before any changes, and got the same result
after my commit ¯\_(ツ)_/¯
So I hope I did that right.
Thanks

4 days agoreport: add cgroup metrics in a separate varlink service (#41489)
Lennart Poettering [Fri, 10 Apr 2026 10:10:06 +0000 (12:10 +0200)] 
report: add cgroup metrics in a separate varlink service (#41489)

Add CpuUsage, MemoryUsage, IOReadBytes, IOReadOperations, and
TasksCurrent in a standalone socket-activated varlink service. These
metrics are gathered from the kernel via cgroup files and PID1's only
role is mapping unit names to cgroup paths — a separate process can
query PID1 once for that mapping and then read the cgroup files
directly, minimizing PID1 involvement.

The new systemd-report-cgroup-metrics service listens at
/run/systemd/report/io.systemd.CGroup and exposes:
  - io.systemd.CGroup.CpuUsage
  - io.systemd.CGroup.IOReadBytes
  - io.systemd.CGroup.IOReadOperations
  - io.systemd.CGroup.MemoryUsage (with type=current/available/peak)
  - io.systemd.CGroup.TasksCurrent

This is spun out of #41078 and based on top of it. Will rebase once
that's merged.

4 days agoresolved: replace assert() with error return in DNSSEC verify functions
Milan Kyselica [Thu, 9 Apr 2026 17:43:14 +0000 (19:43 +0200)] 
resolved: replace assert() with error return in DNSSEC verify functions

dnssec_rsa_verify_raw() asserts that RSA_size(key) matches the RRSIG
signature size, and dnssec_ecdsa_verify_raw() asserts that
EC_KEY_check_key() succeeds. Both conditions depend on parsed DNS
record content. Replace with proper error returns.

The actual crypto verify calls (EVP_PKEY_verify / ECDSA_do_verify)
handle mismatches fine on their own, so the asserts were also redundant.

While at it, fix the misleading "EC_POINT_bn2point failed" log message
that actually refers to an EC_KEY_set_public_key() failure.

Fixes: https://github.com/systemd/systemd/issues/41569
4 days agoclaude-review: improve review quality for large PRs
Daan De Meyer [Fri, 10 Apr 2026 08:04:08 +0000 (08:04 +0000)] 
claude-review: improve review quality for large PRs

Several issues were identified from analyzing logs of a large (52-commit) PR
review:

- Claude was batching multiple commits into a single review agent instead of
  one per worktree. Strengthen the prompt to explicitly prohibit grouping.
- Claude was reading pr-context.json and commit messages before spawning
  agents despite instructions not to, wasting time. Tighten the pre-spawn
  rules to only allow listing worktrees/ and reading review-schema.json.
- Subagents were spawned with model "sonnet" instead of "opus". Add explicit
  instruction to use opus.
- After agents returned, Claude spent 9 minutes re-verifying findings with
  bash/grep/sed commands, duplicating the agents' work. Add instruction to
  trust subagent findings and only read pr-context.json in phase 2.
- Subagents returned markdown-wrapped JSON instead of raw JSON arrays. Add
  instruction requiring raw JSON output only.
- Each subagent was independently reading review-schema.json. Instead have
  the main agent read it once and paste it into each subagent prompt.
- The "drop low-confidence findings" instruction was being used to justify
  dropping findings that Claude itself acknowledged as valid ("solid cleanup
  suggestions", "reasonable consistency improvement"). Remove the instruction.
- Simplify the deduplication instructions
- Stop adding the severity to the body in the post processing job as claude is
  also adding it so they end up duplicated.

4 days agoresolved: skip cache flush on server switch/re-probe when StaleRetentionSec is set
azureuser [Tue, 3 Mar 2026 08:41:45 +0000 (08:41 +0000)] 
resolved: skip cache flush on server switch/re-probe when StaleRetentionSec is set

manager_set_dns_server() and dns_server_flush_cache() call dns_cache_flush()
unconditionally, wiping the entire cache even when StaleRetentionSec is
configured. This defeats serve-stale by discarding cached records that should
remain available during server switches and feature-level re-probes.

The original serve-stale commit (5ed91481ab) added a stale_retention_usec
guard to link_set_dns_server(), and a later commit (7928c0e0a1) added the
same guard to dns_delegate_set_dns_server(), but these two call sites in
resolved-dns-server.c were missed.

This is particularly visible with DNSOverTLS, where TLS handshake failures
trigger frequent feature-level downgrades and re-probes via
dns_server_flush_cache(), flushing the cache each time.

Add the same stale_retention_usec guard to both call sites so that cache
entries are allowed to expire naturally via dns_cache_prune() when
serve-stale is enabled.

Fixes: #40781
This commit was prepared with assistance from an AI coding agent (GitHub
Copilot). All changes have been reviewed for correctness and adherence to the
systemd coding style.

4 days agoreport: add cgroup metrics in a separate varlink service 41489/head
Yaping Li [Fri, 3 Apr 2026 05:01:15 +0000 (22:01 -0700)] 
report: add cgroup metrics in a separate varlink service

Add CpuUsage, MemoryUsage, IOReadBytes, IOReadOperations, and
TasksCurrent in a standalone socket-activated varlink service.

The new systemd-report-cgroup service listens at
/run/systemd/report/io.systemd.CGroup and exposes:
  - io.systemd.CGroup.CpuUsage
  - io.systemd.CGroup.IOReadBytes
  - io.systemd.CGroup.IOReadOperations
  - io.systemd.CGroup.MemoryUsage (with type=current/available/peak)
  - io.systemd.CGroup.TasksCurrent

4 days agocgroup-util: add cg_get_keyed_attribute_uint64() helper
Yaping Li [Wed, 8 Apr 2026 17:19:42 +0000 (10:19 -0700)] 
cgroup-util: add cg_get_keyed_attribute_uint64() helper

Multiple callers of cg_get_keyed_attribute() follow the same pattern of
reading a single keyed attribute and then parsing it as uint64_t with
safe_atou64(). Add a helper that combines both steps.

Convert all existing single-key + uint64 call sites in cgtop, cgroup.c,
and oomd-util.c to use the new helper.

4 days agosd-varlink: fix a potential connection count leak
Frantisek Sumsal [Thu, 9 Apr 2026 13:12:48 +0000 (15:12 +0200)] 
sd-varlink: fix a potential connection count leak

With the old version there was a potential connection count leak if
either of the two hashmap operations in count_connection() failed. In
that case we'd return from sd_varlink_server_add_connection_pair()
_before_ attached the sd_varlink_server object to an sd_varlink object,
and since varlink_detach_server() is the only place where the connection
counter is decremented (called through sd_varlink_close() in various
error paths later _if_ the "server" object is not null, i.e. attached to
the sd_varlink object) we'd "leak" a connection every time this
happened. However, the potential of abusing this is very theoretical,
as one would need to hit OOM every time either of the hashmap operations
was executed for a while before exhausting the connection limit.

Let's just increment the connection counter after any potential error
path, so we don't have to deal with potential rollbacks.

4 days agoudev: fix bounds check in dev_if_packed_info()
Milan Kyselica [Thu, 9 Apr 2026 17:45:19 +0000 (19:45 +0200)] 
udev: fix bounds check in dev_if_packed_info()

The check compared bLength against (size - sizeof(descriptor)), which
is an absolute limit unrelated to the current buffer position. Since
bLength is uint8_t (max 255), this can never exceed size - 9 for any
realistic input, making the check dead code.

Use (size - pos) instead so the check actually catches descriptors
that extend past the end of the read data.

Fixes: https://github.com/systemd/systemd/issues/41570
4 days agodocs: Fix window in PRESSURE.md
Daan De Meyer [Mon, 16 Mar 2026 13:20:12 +0000 (14:20 +0100)] 
docs: Fix window in PRESSURE.md

4 days agodocs: Update MEMORY_PRESSURE.md => PRESSURE.md
Daan De Meyer [Sat, 7 Mar 2026 23:33:09 +0000 (00:33 +0100)] 
docs: Update MEMORY_PRESSURE.md => PRESSURE.md

Make the doc more generic and mention all pressure types, not just
memory.

4 days agocore: Add I/O pressure support
Daan De Meyer [Sat, 7 Mar 2026 22:37:55 +0000 (23:37 +0100)] 
core: Add I/O pressure support

4 days agocore: Add support for CPU pressure notifications
Daan De Meyer [Sat, 7 Mar 2026 22:20:19 +0000 (23:20 +0100)] 
core: Add support for CPU pressure notifications

Works the same way as memory pressure notifications. Code is refactored
to work on enum arrays to reduce duplication.

4 days agotest-mempress: Support unprivileged operation
Daan De Meyer [Sat, 7 Mar 2026 20:25:09 +0000 (21:25 +0100)] 
test-mempress: Support unprivileged operation

4 days agotest-mempress: Migrate to new assertion macros
Daan De Meyer [Sat, 7 Mar 2026 20:13:06 +0000 (21:13 +0100)] 
test-mempress: Migrate to new assertion macros

4 days agocompress: consolidate all compression into compress.c with dlopen
Daan De Meyer [Sat, 28 Mar 2026 23:21:18 +0000 (23:21 +0000)] 
compress: consolidate all compression into compress.c with dlopen

Move the push-based streaming compression API from import-compress.c
into compress.c and delete import-compress.c/h. This consolidates all
compression code in one place and makes all compression libraries
(liblzma, liblz4, libzstd, libz, libbz2) runtime-loaded via dlopen
instead of directly linked.

Introduce opaque Compressor/Decompressor types backed by a heap-
allocated struct defined only in compress.c, keeping all third-party
library headers out of compress.h.

Rewrite the per-codec fd-to-fd stream functions as thin wrappers around
the push API via generic compress_stream()/decompress_stream() taking a
Compression type parameter. Integrate LZ4 into this framework using the
LZ4 Frame API, eliminating all LZ4 special-casing.

Extend the Compression enum with COMPRESSION_GZIP and COMPRESSION_BZIP2
and add the corresponding blob, startswith, and stream functions for
both.

Rename the ImportCompress types and functions: ImportCompressType becomes
the existing Compression enum, ImportCompress becomes Compressor (with
Decompressor typedef), and all import_compress_*/import_uncompress_*
become compressor_*/decompressor_*. Rename dlopen_lzma() to dlopen_xz()
for consistency. Make compression_to_string() return lowercase by
default.

Add INT_MAX/UINT_MAX overflow checks for LZ4, zlib, and bzip2 blob
functions where the codec API uses narrower integer types than our
uint64_t parameters.

Migrate test-compress.c and test-compress-benchmark.c to the TEST()
macro framework, new assertion macros, and codec-generic loops instead
of per-codec duplication.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
4 days agoportablectl: fix swapped arguments for setns()
Frantisek Sumsal [Thu, 9 Apr 2026 16:11:33 +0000 (18:11 +0200)] 
portablectl: fix swapped arguments for setns()

Follow-up for 824fcb95c9e66abe6b350ebab6e0593498ff7aa1.

4 days agoadded root.conf to meson.build 41431/head
ipv6 [Thu, 9 Apr 2026 19:04:16 +0000 (14:04 -0500)] 
added root.conf to meson.build

5 days agoRevert "mkosi: Mark minimal images as Incremental=relaxed"
Daan De Meyer [Thu, 9 Apr 2026 09:55:46 +0000 (11:55 +0200)] 
Revert "mkosi: Mark minimal images as Incremental=relaxed"

The setting has fundamental flaws that can't be easily fixed
(see https://github.com/systemd/mkosi/pull/4273) so revert it's
use as we're dropping it in systemd. Image builds will take a bit
longer again until I figure out a proper fix for this.

This reverts commit 7a70c323681b091328fcf6c9ca3104c7958a1331.

5 days agovconsole-setup: skip setfont(8) when the console driver lacks font support
Franck Bui [Wed, 8 Apr 2026 16:39:58 +0000 (18:39 +0200)] 
vconsole-setup: skip setfont(8) when the console driver lacks font support

Don't run setfont(8) on consoles that don't support
fonts. systemd-vconsole-setup neither fails nor reports errors on such consoles
unlike setfont(8) which emits the following error [1]:

 systemd-vconsole-setup[169]: setfont: ERROR kdfontop.c:183 put_font_kdfontop: Unable to load such font with such kernel version

The check already existed in setup_remaining_vcs() but it was performed too
late.

[1] this was simply ignored by setfont(8) until
https://github.com/legionus/kbd/commit/1e15af4d8b272ca50e9ee1d0c584c5859102c848

5 days agovarlink: add sd_varlink_reply_and_upgrade and varlinkctl serve (#41474)
Daan De Meyer [Thu, 9 Apr 2026 12:19:47 +0000 (14:19 +0200)] 
varlink: add sd_varlink_reply_and_upgrade and varlinkctl serve (#41474)

5 days agosd-varlink: use MSG_PEEK for protocol_upgrade connections 41474/head
Michael Vogt [Tue, 7 Apr 2026 15:54:28 +0000 (17:54 +0200)] 
sd-varlink: use MSG_PEEK for protocol_upgrade connections

When there is a potential protocol upgrade we need to be careful that
we do not read beyond our json message as the custom protocol may be
anything. This was archived via a byte-by-byte read. This is of course
very inefficient. So this commit moves to use MSG_PEEK to find the
boundary of the json message instead. This makes the performance hit
a lot smaller.

Thanks to Lennart for suggesting this.

5 days agovarlink: use single byte reads on SD_VARLINK_SERVER_UPGRADABLE
Michael Vogt [Tue, 7 Apr 2026 15:47:50 +0000 (17:47 +0200)] 
varlink: use single byte reads on SD_VARLINK_SERVER_UPGRADABLE

When the server side of a varlink connection supports connection
upgrades we need to go into single byte-read mode to avoid the
risk of a client that sends the json to protocol upgrade and then
immediately the custom protocol payload. This commit implements
this.

The next step is using MSG_PEEK to avoid the single-byte overhead.

5 days agolibsystemd,varlink: always return two fds in varlink upgrade API
Michael Vogt [Sun, 5 Apr 2026 08:05:30 +0000 (10:05 +0200)] 
libsystemd,varlink: always return two fds in varlink upgrade API

This commit tweaks the API of sd_varlink_call_and_upgrade and
sd_varlink_reply_and_upgrade to return two independent fds even
if the internal {input,output}_fd are the same (e.g. a socket).

This makes the external API easier as there is no longer the risk
of double close. The sd_varlink_call_and_upgrade() is not in a
released version of systemd yet so I presume it is okay to update
it still.

This also allowed some simplifications in varlinkctl.c now that
the handling is easier.

5 days agovarlinkctl: add new `serve` verb to allow wrapping command in varlink
Michael Vogt [Thu, 2 Apr 2026 07:38:41 +0000 (09:38 +0200)] 
varlinkctl: add new `serve` verb to allow wrapping command in varlink

With the new protocol upgrade support in varlinkctl client we can
now do the equivalent for the server side. This commit adds a new
`serve` verb that will serve any command that speaks stdin/stdout
via varlink and its protocol upgrade feature. This is the
"inetd for varlink".

This is useful for various reasons:
1. Allows to e.g. provide a heavily sandboxed io.myorg.xz.Decompress
   varlink endpoint, c.f. xz CVE-2024-3094)
2. Allow sftp over varlink which is quite useful with the
   varlink-http-bridge (that has more flexible auth mechanism than
   plain sftp).
3. Makes testing the varlinkctl client protocol upgrade simpler.
4. Because we can.

5 days agolibsystemd: add sd_varlink_reply_and_upgrade protocol upgrade
Michael Vogt [Wed, 1 Apr 2026 14:55:55 +0000 (16:55 +0200)] 
libsystemd: add sd_varlink_reply_and_upgrade protocol upgrade

This commit adds protocol upgrade support in the libsystemd server
side API code.

5 days agoman: fix borked reference to v262
Lennart Poettering [Thu, 9 Apr 2026 08:11:26 +0000 (10:11 +0200)] 
man: fix borked reference to v262

5 days agosd-varlink: extract varlink_handle_upgrade_fds() helper
Michael Vogt [Thu, 2 Apr 2026 10:16:35 +0000 (12:16 +0200)] 
sd-varlink: extract varlink_handle_upgrade_fds() helper

Extract the fd-handling logic from sd_varlink_call_and_upgrade() into a
shared static helper so that it can be reused by the upcoming server-side
sd_varlink_reply_and_upgrade().

5 days agocompress: write sparse files when decompressing to regular files
noxiouz [Tue, 7 Apr 2026 20:32:52 +0000 (21:32 +0100)] 
compress: write sparse files when decompressing to regular files

Core dumps are often very sparse, containing large zero-filled regions
whose actual disk usage can be significantly reduced by preserving
holes. Previously, decompress_stream() always wrote dense output,
expanding all zero regions into allocated disk blocks.

Each decompression backend (xz, lz4, zstd) now auto-detects whether the
output fd is suitable for sparse writes via a shared should_sparse()
helper. The check requires both S_ISREG (regular file) and !O_APPEND,
since O_APPEND causes write() to ignore the file position set by
lseek(), which would collapse the holes and corrupt the output. For
pipes, sockets, and append-mode files, dense writes are preserved via
loop_write_full() with USEC_INFINITY timeout, matching the original
behavior. After sparse decompression, finalize_sparse() sets the final
file size to account for any trailing holes.

This is transparent to callers — all public signatures are unchanged.
coredumpctl benefits automatically:
- coredumpctl debug: temp file in /var/tmp is now sparse
- coredumpctl dump -o file: output file is now sparse
- coredumpctl dump > file: redirected stdout is now sparse
- coredumpctl dump | ...: pipe output unchanged (dense)
- coredumpctl dump >> file: append mode, falls back to dense

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
Co-developed-by: Codex (GPT-5) <noreply@openai.com>
5 days agovmspawn: Support direct kernel boot without UEFI firmware
Daan De Meyer [Fri, 27 Mar 2026 13:26:16 +0000 (14:26 +0100)] 
vmspawn: Support direct kernel boot without UEFI firmware

When --linux= specifies a non-PE kernel image, automatically disable
UEFI firmware loading (as if --firmware= was passed). If --firmware=
is explicitly set to a path in this case, fail with an error. Booting
a UKI with --firmware= is also rejected since UKIs require UEFI.

--firmware= (empty string) can also be used explicitly to disable
firmware loading for PE kernels.

Other changes:
- Extract OVMF pflash drive setup into cmdline_add_ovmf()
- Extract kernel image type detection into determine_kernel()
- Add smbios_supported() helper to centralize the SMBIOS availability
  check (always available on x86, elsewhere requires firmware)
- Gate SMM, OVMF drives, SMBIOS11 and credential SMBIOS paths
  on firmware/SMBIOS being available
- Beef up the credential logic to fall back to fw_cfg and kernel
  command line in case SMBIOS is not available

5 days agonspawn,vmspawn: fixups for recent changes
Zbigniew Jędrzejewski-Szmek [Wed, 8 Apr 2026 14:41:06 +0000 (16:41 +0200)] 
nspawn,vmspawn: fixups for recent changes

Nits found in post-merge review for
bf5bc9a7b26191ff4254836bd909cbb92eafe480 and
4c778c51c07db3eb0e07dd875f10eb85f086f096.

5 days agocoredumpctll: avoid unnecessary heap copy and decompression for field existence check...
Luca Boccassi [Wed, 8 Apr 2026 20:34:47 +0000 (21:34 +0100)] 
coredumpctll: avoid unnecessary heap copy and decompression for field existence checks (#41520)

`print_list()` and `print_info()` used `RETRIEVE()` to `strndup()` the
entire
`COREDUMP` field into a heap-allocated string, only to check whether it
exists.
With `sd_journal_set_data_threshold(j, 0)` in `print_info()`, this
copies the
full coredump binary (potentially hundreds of MB) to heap just to print
"Storage: journal".

This PR:

1. Makes `sd_journal_get_data()` output parameters optional
(`NULL`-safe), so
   callers can do pure existence checks without receiving the data.
2. Short-circuits `maybe_decompress_payload()` after
`decompress_startswith()`
   succeeds when neither output pointer is requested, skipping full blob
   decompression for compressed journal entries.
3. Switches coredumpctl to pass `NULL, NULL` for the existence checks
instead
   of heap-copying via `RETRIEVE()`.

5 days agosd-varlink: check flags against the correct field
Frantisek Sumsal [Wed, 8 Apr 2026 14:30:54 +0000 (16:30 +0200)] 
sd-varlink: check flags against the correct field

Otherwise even a method without SD_VARLINK_SUPPORTS_MORE/REQUIRES_MORE
can emit "continues" replies without our IDL validation catching it.

6 days agoclangd: Strip GCC-only flags and silence unknown-attributes
Daan De Meyer [Wed, 8 Apr 2026 17:35:10 +0000 (17:35 +0000)] 
clangd: Strip GCC-only flags and silence unknown-attributes

Several GCC-only options in our compile_commands.json
(-fwide-exec-charset=UCS2, used by EFI boot code for UTF-16 string
literals, and -maccumulate-outgoing-args) cause clangd to emit
driver-level "unknown argument" errors. These can't be silenced through
Diagnostics.Suppress, so remove them via CompileFlags.Remove before
clang ever sees them.

Also suppress the -Wunknown-attributes warning that fires on every use
of _no_reorder_, since meson unconditionally expands it to the GCC-only
__no_reorder__ attribute when configured with GCC.

6 days agoAdded NEWS
ipv6 [Wed, 8 Apr 2026 15:43:49 +0000 (10:43 -0500)] 
Added NEWS

6 days agoAdded tmpfiles.d/root.conf to set access permissions to root / dir
ipv6 [Wed, 8 Apr 2026 15:28:59 +0000 (10:28 -0500)] 
Added tmpfiles.d/root.conf to set access permissions to root / dir

6 days agonetworkd-wwan: drop unreachable unknown-bearer fallback path
noxiouz [Tue, 7 Apr 2026 13:47:33 +0000 (14:47 +0100)] 
networkd-wwan: drop unreachable unknown-bearer fallback path

bearer_get_by_path() only succeeds when both modem and bearer are found.
On failure, trying bearer_new_and_initialize(modem, path) was
unreachable and relied on a modem value that is not returned on that
path.

Treat unknown bearers as no-op and rely on modem_map_bearers() for
association during initialization.

Co-developed-by: Codex (GPT-5) <noreply@openai.com>
6 days agocoredumpctl: use NULL outputs for COREDUMP existence checks 41520/head
noxiouz [Tue, 7 Apr 2026 15:30:04 +0000 (16:30 +0100)] 
coredumpctl: use NULL outputs for COREDUMP existence checks

print_list() and print_info() used RETRIEVE() to strndup() the entire
COREDUMP field into a heap-allocated string, only to check whether it
exists.  With sd_journal_set_data_threshold(j, 0) in print_info(),
this copies the full coredump binary (potentially hundreds of MB) to
heap just to print "Storage: journal".

Now that sd_journal_get_data() accepts NULL output pointers, use a
direct NULL/NULL existence check instead.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
6 days agosd-journal: skip full decompression when caller only checks field existence
noxiouz [Tue, 7 Apr 2026 15:29:56 +0000 (16:29 +0100)] 
sd-journal: skip full decompression when caller only checks field existence

When both ret_data and ret_size are NULL after decompress_startswith()
has confirmed the field matches, skip the decompress_blob() call.
This avoids decompressing potentially large payloads (e.g. inline
coredumps) just to discard the result.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
6 days agosd-journal: make sd_journal_get_data() output params optional
noxiouz [Tue, 7 Apr 2026 15:29:51 +0000 (16:29 +0100)] 
sd-journal: make sd_journal_get_data() output params optional

Allow callers to pass NULL for ret_data and/or ret_size when they only
need to check whether a field exists.  Initialize provided output
pointers to safe defaults and update the manual page accordingly.

Propagate the NULL-ness through to journal_file_data_payload() so that
downstream helpers can optimize for the existence-check case.

Co-developed-by: Claude Opus 4.6 <noreply@anthropic.com>
6 days agotmpfiles: skip redundant label writes to avoid unnecessary timestamp changes
Nandakumar Raghavan [Tue, 7 Apr 2026 06:33:41 +0000 (06:33 +0000)] 
tmpfiles: skip redundant label writes to avoid unnecessary timestamp changes

When systemd-tmpfiles processes a 'z' (relabel) entry, fd_set_perms()
unconditionally calls label_fix_full() even when mode, owner, and group
already match. This causes setfilecon_raw() (SELinux) or xsetxattr() (SMACK)
to write the security label even if it is already correct, which on some
kernels updates the file's timestamps unnecessarily.

Fix this by comparing the current label with the desired label before
writing, and skipping the write when they already match. This is consistent
with how fd_set_perms() already skips chmod/chown when the values are
unchanged.

6 days agoMacroize option parsing in nspawn, vmspawn, journal-remote (#41542)
Daan De Meyer [Wed, 8 Apr 2026 13:33:51 +0000 (15:33 +0200)] 
Macroize option parsing in nspawn, vmspawn, journal-remote (#41542)