]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
4 years agoxdg-autostart-generator: ignore DBusActivatable=true 18695/head
Zbigniew Jędrzejewski-Szmek [Fri, 19 Feb 2021 08:50:09 +0000 (09:50 +0100)] 
xdg-autostart-generator: ignore DBusActivatable=true

See https://wiki.gnome.org/HowDoI/DBusApplicationLaunching and
https://wiki.gnome.org/Initiatives/GnomeGoals/DBusActivatable for a description
of this key:
> Instead of the typical UNIX-style fork()/exec() approach to process creation,
> launching an application is done by sending a D-Bus message to the well-known
> name of that application, causing a D-Bus activation.
>
> Starting processes with D-Bus activation ensures that each application gets
> started in its own pristine environment, as a direct descendent of the
> session -- not in the environment of whatever its parent happened to be. This
> is important for ensuring the app ends up in the correct cgroup, for example.

So this motivation is not important for us: we launch stuff ourselves better.

This fixes warnings during boot:
systemd-xdg-autostart-generator[2274]: /etc/xdg/autostart/org.freedesktop.problems.applet.desktop:92: Unknown key name 'DBusActivatable' in section 'Desktop Entry', ignoring.

4 years agoxdg-autostart-generator: reindent
Zbigniew Jędrzejewski-Szmek [Fri, 19 Feb 2021 08:47:32 +0000 (09:47 +0100)] 
xdg-autostart-generator: reindent

4 years agonetwork: nexthop: update ID of nexthop created without specifiying ID
Yu Watanabe [Fri, 5 Feb 2021 01:09:12 +0000 (10:09 +0900)] 
network: nexthop: update ID of nexthop created without specifiying ID

Otherwise, nexthop_configure() -> nexthop_add() creates NextHop object
without ID in link->nexthop, and then, manager_rtnl_process_nexthop() ->
nexthop_add_foreign() also creates another NextHop object with ID in
link->nexthop_foreign.

4 years agonetwork: configure nexthop before routes that requires gateway
Yu Watanabe [Thu, 4 Feb 2021 14:13:08 +0000 (23:13 +0900)] 
network: configure nexthop before routes that requires gateway

This is a preparation for later commits. When RTA_NH_ID is set to a
route, then the corresponding nexthop must be exist.

4 years agotree-wide: fix typo
Yu Watanabe [Fri, 19 Feb 2021 04:27:56 +0000 (13:27 +0900)] 
tree-wide: fix typo

4 years agoGH Actions: Fix labeler bot
Jameer Pathan [Fri, 19 Feb 2021 05:28:20 +0000 (10:58 +0530)] 
GH Actions: Fix labeler bot

4 years agoMerge pull request #18659 from poettering/permyriadification
Yu Watanabe [Fri, 19 Feb 2021 05:22:10 +0000 (14:22 +0900)] 
Merge pull request #18659 from poettering/permyriadification

use scaling relative to UINT32_MAX instead of percentages/permyriads wherever we can

4 years agoRecommend drop-ins over modifications to the main config file
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 19:57:06 +0000 (20:57 +0100)] 
Recommend drop-ins over modifications to the main config file

As discussed in https://github.com/systemd/systemd/pull/18347.

4 years agotable: drop trailing white spaces of the last cell in row
Yu Watanabe [Mon, 1 Feb 2021 16:47:58 +0000 (01:47 +0900)] 
table: drop trailing white spaces of the last cell in row

Fixes #18415.

4 years agoupdate NEWS
Lennart Poettering [Thu, 18 Feb 2021 23:19:45 +0000 (00:19 +0100)] 
update NEWS

4 years agooomd: increase accuracy of SwapUsedLimit= to permyriads too 18659/head
Lennart Poettering [Wed, 17 Feb 2021 16:56:26 +0000 (17:56 +0100)] 
oomd: increase accuracy of SwapUsedLimit= to permyriads too

oomd.conf has two parameters with fractionals: SwapUsedLimit= and
DefaultMemoryPressureLimit=, but one accepts permyriads, the other only
percentages, for no apparent reason. One carries the "Percent" in the
name, the other doesn't.

Let's clean this up: always accept permyriads, and drop the suffix,
given that it is misleading.

I figure we should internally try to focus on scaling everything
relative to UINT32_MAX, and if that isn't in the cards at least 10000,
but never permille nor percent unless there's a really really good
reason for it (e.g. interface defined by someone else).

4 years agocore: use our usual UINT32_MAX scaling for OOMD limits
Lennart Poettering [Wed, 17 Feb 2021 16:51:27 +0000 (17:51 +0100)] 
core: use our usual UINT32_MAX scaling for OOMD limits

So far OOMD limits used permyriads, as an upgrade from the original
percent.

The rest of our codebase typically scales stuff relative to UINT32_MAX.
Let's clean this up, an make sure this happens here too. This is
particularly relevant, as this is exposed in unit files and API, and
before we mark this stable we should get the APIs right.

4 years agoparse-util: add format string macro for outputting permyriad
Lennart Poettering [Wed, 17 Feb 2021 16:29:43 +0000 (17:29 +0100)] 
parse-util: add format string macro for outputting permyriad

Let's define a set of macros for making output of permyriad values easy.
They are printed in pure ASCII, i.e. without the permille/permyriad
suffix, using just percent and two places after the dot.

4 years agotree-wide: port various pieces of code over to UINT32_SCALE_FROM_PERMYRIAD()
Lennart Poettering [Wed, 17 Feb 2021 16:03:52 +0000 (17:03 +0100)] 
tree-wide: port various pieces of code over to UINT32_SCALE_FROM_PERMYRIAD()

4 years agoutil: add some helpers for converting percent/permille/permyriad to parts of 2^32-1
Lennart Poettering [Wed, 17 Feb 2021 15:53:11 +0000 (16:53 +0100)] 
util: add some helpers for converting percent/permille/permyriad to parts of 2^32-1

At various places we accept values scaled to the range 0…2^32-1 which
are exposed to the user as percentages/permille/permyriad. Let's add
some helper macros (actually: typesafe macro-like functions) that help
with converting our internal encoding to the external encodings.

benefits: some of the previous code rounded up, some down. let's always
round to nearest, to ensure that our conversions are reversible. Also,
check for overflows correctly.

This also adds a test that makes sure that for the full
percent/permille/permyriad ranges we can convert forth and back without
loss of accuracy.

4 years agopercent-util: when parsing permyriads, permit percents too with 1 place after the dot
Lennart Poettering [Wed, 17 Feb 2021 14:33:05 +0000 (15:33 +0100)] 
percent-util: when parsing permyriads, permit percents too with 1 place after the dot

Previously, when parsing myriads, we'd support:

 x%          → percent, no places after the dot
 x.yz%       → percent, two places after the dot
 x‰          → permille, no places after the dot
 x.y‰        → permille, one place after the dot
 x‱          → permyriad, no places after the dot

What's missing is:

 x.y%        → percent, one place after the dot

Let's add it in.

4 years agoutil: move percent/permille/permyriad parser into percent-util.[ch]
Lennart Poettering [Wed, 17 Feb 2021 14:23:15 +0000 (15:23 +0100)] 
util: move percent/permille/permyriad parser into percent-util.[ch]

A good chunk of parse-util.[ch] has been about parsing parts per
hundred/thousand/ten-thousand. Let's split that out into its own file.

No code changes, just some shuffling around.

4 years agomain: let's use physical_memory_scale() where appropriate
Lennart Poettering [Wed, 17 Feb 2021 13:40:13 +0000 (14:40 +0100)] 
main: let's use physical_memory_scale() where appropriate

This way we can take benefit of the fact that physical_memory_scale()
aligns on page sizes.

4 years agotree-wide: parse permyriads wherever we can
Lennart Poettering [Wed, 17 Feb 2021 13:37:08 +0000 (14:37 +0100)] 
tree-wide: parse permyriads wherever we can

Given that we now have a parser for permyriads, let's use it everywhere
for greater accuracy. This means wherever we previously supported % and
‰, we now also support ‱.

4 years agolimits-util: tweak overflow checks for (physical_memory|system_tasks)_max_scale()
Lennart Poettering [Wed, 17 Feb 2021 13:34:01 +0000 (14:34 +0100)] 
limits-util: tweak overflow checks for (physical_memory|system_tasks)_max_scale()

Also, shortcut two special cases for passing through values as-is, so
that we are not needlessly subjected to overflow issues for them.

4 years agoupdate TODO
Lennart Poettering [Thu, 18 Feb 2021 21:31:11 +0000 (22:31 +0100)] 
update TODO

4 years agonetwork: rename UseFQDN= -> UseHostname=
Yu Watanabe [Wed, 17 Feb 2021 20:30:09 +0000 (05:30 +0900)] 
network: rename UseFQDN= -> UseHostname=

Prompted by
https://github.com/systemd/systemd/pull/18543#issuecomment-780798451.

4 years agoMerge pull request #18685 from poettering/network-type-tweaks
Lennart Poettering [Thu, 18 Feb 2021 20:19:51 +0000 (21:19 +0100)] 
Merge pull request #18685 from poettering/network-type-tweaks

sd-network.h type tweaks

4 years agorandom-util: fix type of random_u64_range()
Lennart Poettering [Thu, 18 Feb 2021 15:18:51 +0000 (16:18 +0100)] 
random-util: fix type of random_u64_range()

As the name of the function suggests this is supposed to return
uint64_t, of course. Fix it. Not sure how this mistake happened in the
first place...

4 years agoMerge pull request #18546 from poettering/sd-device-action
Lennart Poettering [Thu, 18 Feb 2021 19:54:25 +0000 (20:54 +0100)] 
Merge pull request #18546 from poettering/sd-device-action

export sd_device_get_action() API + more

4 years agohttps://github.com/systemd/systemd/issues/15360
chri2 [Thu, 11 Feb 2021 13:48:50 +0000 (14:48 +0100)] 
https://github.com/systemd/systemd/issues/15360

The additional rules fix a firmware bug in the en keyboard of Librem notebooks by Purism.

By doing so the break the keyboard with other layouts which do not have the same bug in their firmware.

4 years agoresolved: improve debug logging on incoming messages a bit
Lennart Poettering [Mon, 16 Nov 2020 20:04:11 +0000 (21:04 +0100)] 
resolved: improve debug logging on incoming messages a bit

4 years agoMerge pull request #18679 from keszybz/rfkill-size-leniency
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 18:53:25 +0000 (19:53 +0100)] 
Merge pull request #18679 from keszybz/rfkill-size-leniency

struct rfkill_event read/write size leniency

4 years agojournald: when we fail to add a new entry to a journal, return the seqno
Lennart Poettering [Wed, 17 Feb 2021 22:11:42 +0000 (23:11 +0100)] 
journald: when we fail to add a new entry to a journal, return the seqno

Fixes: #18005
4 years agoudevadm: after validating action, use our internal string instead of optarg 18546/head
Lennart Poettering [Wed, 10 Feb 2021 21:19:41 +0000 (22:19 +0100)] 
udevadm: after validating action, use our internal string instead of optarg

This doesn't really change anything, but feels nicer, since it abstracts
away what device_action_from_string()/device_action_to_string() do
internally, and always uses a normalized action string (yes, there's no
ambiguity, but it's nice to stay abstract, maybe one day there is
ambiguity around this)

4 years agosd-device: add sd_device_get_action() + sd_device_get_seqnum() + sd_device_new_from_s...
Lennart Poettering [Wed, 10 Feb 2021 21:15:01 +0000 (22:15 +0100)] 
sd-device: add sd_device_get_action() + sd_device_get_seqnum() + sd_device_new_from_stat_rdev()

To make sd-device properly usable for all programs we need to provide an
API for the "action" field of an event, it's one of the most relevant
ones, and it was so far missing.

This also adds sd_device_get_seqnum(), which isn't that interesting,
except for generating pretty debug output, which we use it ourselves
for.

This also makes device_new_from_stat_rdev() public, as it is truly
useful, as we can see in our own uses of it, and I think is fairly
generic to show up in the public APIs.

4 years agoMerge pull request #18664 from poettering/resolved-defrag
Lennart Poettering [Thu, 18 Feb 2021 17:20:36 +0000 (18:20 +0100)] 
Merge pull request #18664 from poettering/resolved-defrag

resolved: many UDP fragmentation tweaks

4 years agosd-device: don't compare pointers with numeric zero
Lennart Poettering [Wed, 10 Feb 2021 21:18:52 +0000 (22:18 +0100)] 
sd-device: don't compare pointers with numeric zero

Our coding style says no to this.

4 years agoMerge pull request #18667 from poettering/resolved-change-notification
Lennart Poettering [Thu, 18 Feb 2021 17:19:09 +0000 (18:19 +0100)] 
Merge pull request #18667 from poettering/resolved-change-notification

resolved: optimize dbus change notification signals a bit

4 years agonetwork: tighten table alignment a bit 18685/head
Lennart Poettering [Thu, 18 Feb 2021 16:56:11 +0000 (17:56 +0100)] 
network: tighten table alignment a bit

4 years agonetwork: suffix types with _t in public headers
Lennart Poettering [Thu, 18 Feb 2021 16:53:56 +0000 (17:53 +0100)] 
network: suffix types with _t in public headers

Apparently, in our current public headers (i.e. those called sd-*.h) we
suffixed typedefs that we use as values with _t, but we didn't do this
for enum typedefs. Fix that while this stuff is not actually public yet.

With this scheme "value typedefs" now end systematically in _t, and
"object typedefs" (i.e. structures that are typically passed around via
pointers and not values) do not.

No code changes, just some renaming.

4 years agoresolved: optimize change notification handling away if bus calls set the same values... 18667/head
Lennart Poettering [Wed, 18 Nov 2020 12:52:59 +0000 (13:52 +0100)] 
resolved: optimize change notification handling away if bus calls set the same values as were already set

Prompted-by: #17577 (but doesn't fix this, since this commit only
handles D-Bus-induced changes, not the ones made via networkd)

4 years agobasic: add set_equal() helper
Lennart Poettering [Wed, 18 Nov 2020 12:48:02 +0000 (13:48 +0100)] 
basic: add set_equal() helper

4 years agoresolved: take fragment size into consideration when determining EDNS0 udp packet... 18664/head
Lennart Poettering [Mon, 16 Nov 2020 20:02:06 +0000 (21:02 +0100)] 
resolved: take fragment size into consideration when determining EDNS0 udp packet size

4 years agoresolved: let's track fragment sizes of servers/retry on fragmenting
Lennart Poettering [Mon, 16 Nov 2020 22:26:37 +0000 (23:26 +0100)] 
resolved: let's track fragment sizes of servers/retry on fragmenting

Fragmenting sucks, let's avoid it. Thus let's start tracking the maximum
fragment size we receive.

Also, let's redo a transaction via TCP if we see fragmenting on UDP, as
effective mitigation against DNS fragment attacks.

4 years agoresolved: tweak how we calculate MTU for sending packets
Lennart Poettering [Mon, 16 Nov 2020 22:27:21 +0000 (23:27 +0100)] 
resolved: tweak how we calculate MTU for sending packets

Let's take all MTU info we possibly have into account, i.e. the one
reported via netlink, as before and the one the socket might now (from
PMTUD and such), clamped by our own ideas.

4 years agoresolved: add udp_header_size() helper
Lennart Poettering [Mon, 16 Nov 2020 20:00:24 +0000 (21:00 +0100)] 
resolved: add udp_header_size() helper

4 years agoresolved: collect incoming fragment size when receiving UDP datagrams
Lennart Poettering [Mon, 16 Nov 2020 13:05:52 +0000 (14:05 +0100)] 
resolved: collect incoming fragment size when receiving UDP datagrams

We can later use this to adapt our announced EDNS buffer size in order
to avoid fragmentation to make the best of large datagrams while still
avoiding he security weaknesses of it.

4 years agoresolved: disable path MTU discovery for UDP traffic
Lennart Poettering [Mon, 16 Nov 2020 13:02:52 +0000 (14:02 +0100)] 
resolved: disable path MTU discovery for UDP traffic

This disables path MTU discovery both for our UDP upstream connections
and our UDP stub, following the suggestions of:

https://blog.apnic.net/2019/07/12/its-time-to-consider-avoiding-ip-fragmentation-in-the-dns/

This more or less follows the model of other DNS servers on this.

4 years agoman: Rename duplicate Credentials section name
Дамјан Георгиевски [Thu, 18 Feb 2021 14:08:48 +0000 (15:08 +0100)] 
man: Rename duplicate Credentials section name

A "Credentials" section name in systemd.exec man page was used
both for User/Group and for actual credentials support in systemd.

Rename the first instance to "User/Group Identity"

4 years agonetworkd-test: reenable dnssec while testing
Lennart Poettering [Mon, 16 Nov 2020 20:06:56 +0000 (21:06 +0100)] 
networkd-test: reenable dnssec while testing

We need to list the synthesized domains as NTAs, otherwise the DNSSEC
validation of course cannot succeed.

Fixes: #10487 #5029
4 years agoMerge pull request #18557 from poettering/enum-force-s64
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 13:16:15 +0000 (14:16 +0100)] 
Merge pull request #18557 from poettering/enum-force-s64

force public enums to be 64bit wide

4 years agonetwork: Add "route_localnet" sysctl support
Susant Sahani [Thu, 18 Feb 2021 08:55:13 +0000 (09:55 +0100)] 
network: Add "route_localnet" sysctl support

4 years agoMerge pull request #18665 from poettering/resolved-fastopen
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 11:55:10 +0000 (12:55 +0100)] 
Merge pull request #18665 from poettering/resolved-fastopen

resolved: use TCP FASTOPEN on the local DNS stub

4 years agoMerge pull request #18625 from bluca/sysext_refactor
Luca Boccassi [Thu, 18 Feb 2021 10:43:08 +0000 (10:43 +0000)] 
Merge pull request #18625 from bluca/sysext_refactor

dissect: parse and store extension-release metadata

4 years agorfkill: use short writes and accept long reads 18679/head
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 09:48:08 +0000 (10:48 +0100)] 
rfkill: use short writes and accept long reads

I'm seeing the following with kernel-core-5.10.16-200.fc33.x86_64:

$ sudo SYSTEMD_LOG_LEVEL=debug build/systemd-rfkill
Reading struct rfkill_event: got 8 bytes.
A new rfkill device has been added with index 0 and type bluetooth.
Found cgroup2 on /sys/fs/cgroup/, full unified hierarchy
Found container virtualization none.
rfkill0: Operating on rfkill device 'tpacpi_bluetooth_sw'.
Writing struct rfkill_event successful (8 of 9 bytes).
Loaded state '0' from /var/lib/systemd/rfkill/platform-thinkpad_acpi:bluetooth.
Reading struct rfkill_event: got 8 bytes.
A new rfkill device has been added with index 1 and type wwan.
rfkill1: Operating on rfkill device 'tpacpi_wwan_sw'.
Writing struct rfkill_event successful (8 of 9 bytes).
Loaded state '0' from /var/lib/systemd/rfkill/platform-thinkpad_acpi:wwan.
Reading struct rfkill_event: got 8 bytes.
A new rfkill device has been added with index 2 and type bluetooth.
rfkill2: Operating on rfkill device 'hci0'.
Writing struct rfkill_event successful (8 of 9 bytes).
Loaded state '0' from /var/lib/systemd/rfkill/pci-0000:00:14.0-usb-0:7:1.0:bluetooth.
Reading struct rfkill_event: got 8 bytes.
A new rfkill device has been added with index 3 and type wlan.
rfkill3: Operating on rfkill device 'phy0'.
Writing struct rfkill_event successful (8 of 9 bytes).
Loaded state '0' from /var/lib/systemd/rfkill/pci-0000:04:00.0:wlan.
All events read and idle, exiting.

We were expecting a read of exactly RFKILL_EVENT_SIZE_V1==8 bytes. But the
structure has 9 after [1].

[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=14486c82612a177cb910980c70ba900827ca0894

For some reason the kernel does not accept the full structure size, but cuts
the write short after 8 bytes:

static ssize_t rfkill_fop_write(struct file *file, const char __user *buf,
size_t count, loff_t *pos)
{
struct rfkill_event ev;

/* we don't need the 'hard' variable but accept it */
if (count < RFKILL_EVENT_SIZE_V1 - 1)
return -EINVAL;

/*
 * Copy as much data as we can accept into our 'ev' buffer,
 * but tell userspace how much we've copied so it can determine
 * our API version even in a write() call, if it cares.
 */
count = min(count, sizeof(ev));
if (copy_from_user(&ev, buf, count))
return -EFAULT;

... so it should accept the full size. I'm not sure what is going on here.

But we don't care about the extra fields, so let's accept a write as long as
it's at least RFKILL_EVENT_SIZE_V1.

Fixes #18677.

4 years agorfkill: improve error logging
Zbigniew Jędrzejewski-Szmek [Thu, 18 Feb 2021 09:40:16 +0000 (10:40 +0100)] 
rfkill: improve error logging

If we get something of unexpected size, log the sizes. Also, don't log twice.

4 years agoRemove outdated disable_ipv6 docs
Richard Laager [Thu, 18 Feb 2021 07:11:53 +0000 (01:11 -0600)] 
Remove outdated disable_ipv6 docs

This was changed in commit 482efedc081b0c4bf2e77a3dee6b979d9c9a5765,
which was released in v243, to only enable and never disable IPv6.

Signed-off-by: Richard Laager <rlaager@wiktel.com>
4 years agoMerge pull request #18596 from keszybz/systemctl-quiet-legend
Lennart Poettering [Wed, 17 Feb 2021 22:40:04 +0000 (23:40 +0100)] 
Merge pull request #18596 from keszybz/systemctl-quiet-legend

systemctl: hide legends with --quiet, allow overriding

4 years agoMerge pull request #18651 from poettering/einval-followup
Lennart Poettering [Wed, 17 Feb 2021 22:15:50 +0000 (23:15 +0100)] 
Merge pull request #18651 from poettering/einval-followup

two follow-up fixes for the enum einvalification

4 years agonetwork: DHCP option- use correct byteorder
Susant Sahani [Wed, 17 Feb 2021 18:09:25 +0000 (19:09 +0100)] 
network: DHCP option- use correct byteorder

4 years agoMerge pull request #18656 from yuwata/network-nexthop-tiny-cleanups
Lennart Poettering [Wed, 17 Feb 2021 22:14:12 +0000 (23:14 +0100)] 
Merge pull request #18656 from yuwata/network-nexthop-tiny-cleanups

network: nexthop: tiny cleanups

4 years agohwdb: fix indentation
Lennart Poettering [Wed, 17 Feb 2021 18:10:17 +0000 (19:10 +0100)] 
hwdb: fix indentation

a bunch of entries use 2ch instead of 1ch indentation. Fix that.

4 years agoMerge pull request #18662 from yuwata/in-addr-is-set
Lennart Poettering [Wed, 17 Feb 2021 22:13:27 +0000 (23:13 +0100)] 
Merge pull request #18662 from yuwata/in-addr-is-set

in-addr-util: introduce in_addr_is_set() or friends

4 years agosysctl: downgrade warning about excluded keys
Zbigniew Jędrzejewski-Szmek [Wed, 17 Feb 2021 18:46:19 +0000 (19:46 +0100)] 
sysctl: downgrade warning about excluded keys

Our own config generates logs like this:
systemd-sysctl[1280]: Not setting net/ipv4/conf/all/rp_filter (explicit setting exists).
systemd-sysctl[1280]: Not setting net/ipv4/conf/default/rp_filter (explicit setting exists).
systemd-sysctl[1280]: Not setting net/ipv4/conf/all/accept_source_route (explicit setting exists).
systemd-sysctl[1280]: Not setting net/ipv4/conf/default/accept_source_route (explicit setting exists).
systemd-sysctl[1280]: Not setting net/ipv4/conf/all/promote_secondaries (explicit setting exists).
systemd-sysctl[1280]: Not setting net/ipv4/conf/default/promote_secondaries (explicit setting exists).

There is no error and nothing really to see.

4 years agoenv-util: refactor parsing helper for SYSTEMD_SYSEXT_HIERARCHIES out of sysext 18625/head
Luca Boccassi [Tue, 19 Jan 2021 17:11:55 +0000 (17:11 +0000)] 
env-util: refactor parsing helper for SYSTEMD_SYSEXT_HIERARCHIES out of sysext

4 years agoos-util: allow missing VERSION_ID on the host
Luca Boccassi [Fri, 12 Feb 2021 15:30:10 +0000 (15:30 +0000)] 
os-util: allow missing VERSION_ID on the host

Rolling releases, like ArchLinux, do not set VERSION_ID in
their os-release files, so allow matching simply on ID if the host
does not provide anything.

4 years agoos-util: split extension_release_validate out of sysext
Luca Boccassi [Wed, 27 Jan 2021 12:54:15 +0000 (12:54 +0000)] 
os-util: split extension_release_validate out of sysext

4 years agomachine: parse and store extension-release
Luca Boccassi [Wed, 27 Jan 2021 12:59:45 +0000 (12:59 +0000)] 
machine: parse and store extension-release

Follow the same pattern as os-release parsing, and store the key-value
pairs in a strv if found

4 years agodissect: parse, store and show extension-release info
Luca Boccassi [Wed, 27 Jan 2021 13:03:37 +0000 (13:03 +0000)] 
dissect: parse, store and show extension-release info

4 years agodissect: store image name, following usual parsing rules
Luca Boccassi [Wed, 27 Jan 2021 12:57:27 +0000 (12:57 +0000)] 
dissect: store image name, following usual parsing rules

The name of '/foo/bar/baz.raw' name is 'baz'

4 years agoenv-util: add strv_env_pairs_get helper
Luca Boccassi [Wed, 27 Jan 2021 12:51:17 +0000 (12:51 +0000)] 
env-util: add strv_env_pairs_get helper

4 years agoos-util: add load_extension_release_pairs helper
Luca Boccassi [Wed, 27 Jan 2021 12:53:13 +0000 (12:53 +0000)] 
os-util: add load_extension_release_pairs helper

4 years agoos-util: add path_is_extension_tree helper
Luca Boccassi [Wed, 27 Jan 2021 12:52:10 +0000 (12:52 +0000)] 
os-util: add path_is_extension_tree helper

4 years agoresolved: also use TCP tweaks on LLMNR (plus unify setsockopt() code) 18665/head
Lennart Poettering [Tue, 17 Nov 2020 10:42:43 +0000 (11:42 +0100)] 
resolved: also use TCP tweaks on LLMNR (plus unify setsockopt() code)

4 years agoresolved: enable TCP_FASTOPEN + TCP_NODELAY on stub TCP socket
Lennart Poettering [Tue, 17 Nov 2020 10:19:24 +0000 (11:19 +0100)] 
resolved: enable TCP_FASTOPEN + TCP_NODELAY on stub TCP socket

Latency matters. Four our local DNS stub it's not really that important,
but let's still do it, it's basically free after all.

4 years agoshell-completion: complete --legend=no for resolvectl and systemctl 18596/head
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 19:16:33 +0000 (20:16 +0100)] 
shell-completion: complete --legend=no for resolvectl and systemctl

I don't think it makes sense to complete --legend=yes. It is the default, and
it would be only used very rarely (and then it is easy enough to just remove
the '=no' part from the suggested string).

4 years agosystemctl: hide legends with --quiet, allow overriding
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 09:56:28 +0000 (10:56 +0100)] 
systemctl: hide legends with --quiet, allow overriding

--no-legend is replaced by --legend=no.

--quiet now implies --legend=no, but --legend=yes may be used to override that.
--quiet controls hints and warnings and such, and --legend controls just the
legends. I think it makes sense to allow both to controlled independently, in
particular --quiet --legend makes sense when using systemctl in a script to
provide some user-visible output.

Fixes #18560.

4 years agojournal-remote: inline one more iterator variable declaration
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 18:48:09 +0000 (19:48 +0100)] 
journal-remote: inline one more iterator variable declaration

4 years agojournal-remote: convert to parse_boolean_argument() and fix type confusion
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 18:47:41 +0000 (19:47 +0100)] 
journal-remote: convert to parse_boolean_argument() and fix type confusion

We were passing a reference to 'int arg_seal' to config_parse_bool(),
which expects a 'bool *'. Luckily, this would work, because 'bool'
is smaller than 'int', so config_parse_bool() would set the least-significant
byte of arg_seal. At least I think so. But let's use consistent types ;)

Also, modernize style a bit and don't use integers in boolean context.

4 years agotree-wide: use parse_boolean_argument() for variables with non-boolean type
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 18:41:39 +0000 (19:41 +0100)] 
tree-wide: use parse_boolean_argument() for variables with non-boolean type

This still works nicely, but we need to assign the return value ourselves.
As before, one nice effect is that error messages are uniform.

4 years agotree-wide: add a helper to parse boolean optarg
Zbigniew Jędrzejewski-Szmek [Mon, 15 Feb 2021 18:32:42 +0000 (19:32 +0100)] 
tree-wide: add a helper to parse boolean optarg

This nicely covers the case when optarg is optional. The same parser can be
used when the option string passed to getopt_long() requires a parameter and
when it doesn't.

The error messages are made consistent.
Also fixes a log error c&p in --crash-reboot message.

4 years agonetwork: NHA_ID should be always set 18656/head
Yu Watanabe [Fri, 5 Feb 2021 02:51:21 +0000 (11:51 +0900)] 
network: NHA_ID should be always set

4 years agonetwork: constify arguments
Yu Watanabe [Fri, 5 Feb 2021 01:07:34 +0000 (10:07 +0900)] 
network: constify arguments

4 years agonetwork: introduce log_nexthop_debug()
Yu Watanabe [Fri, 5 Feb 2021 00:44:49 +0000 (09:44 +0900)] 
network: introduce log_nexthop_debug()

4 years agoMerge pull request #18640 from poettering/resolved-dnssec-retry-harder
Lennart Poettering [Wed, 17 Feb 2021 18:50:58 +0000 (19:50 +0100)] 
Merge pull request #18640 from poettering/resolved-dnssec-retry-harder

resolved: two dnssec retry/downgrade tweaks

4 years agotree-wide: constify variables if possible 18662/head
Yu Watanabe [Wed, 17 Feb 2021 18:33:39 +0000 (03:33 +0900)] 
tree-wide: constify variables if possible

4 years agonetwork: use temporary buffer for safety
Yu Watanabe [Wed, 17 Feb 2021 18:27:35 +0000 (03:27 +0900)] 
network: use temporary buffer for safety

4 years agonetwork: use in_addr_prefix_to_string()
Yu Watanabe [Wed, 17 Feb 2021 18:22:28 +0000 (03:22 +0900)] 
network: use in_addr_prefix_to_string()

4 years agoresolve: use sockaddr_in_addr()
Yu Watanabe [Wed, 17 Feb 2021 17:51:09 +0000 (02:51 +0900)] 
resolve: use sockaddr_in_addr()

4 years agoresolve: make manager_find_ifindex() or friends return earlier
Yu Watanabe [Wed, 17 Feb 2021 17:50:50 +0000 (02:50 +0900)] 
resolve: make manager_find_ifindex() or friends return earlier

4 years agotree-wide: use in_addr_is_set() or friends
Yu Watanabe [Wed, 17 Feb 2021 16:29:43 +0000 (01:29 +0900)] 
tree-wide: use in_addr_is_set() or friends

4 years agonetwork: assign values after all checks are passed
Yu Watanabe [Wed, 17 Feb 2021 17:23:42 +0000 (02:23 +0900)] 
network: assign values after all checks are passed

4 years agoin-addr-util: introduce in6_addr_equal()
Yu Watanabe [Wed, 17 Feb 2021 17:17:08 +0000 (02:17 +0900)] 
in-addr-util: introduce in6_addr_equal()

4 years agoin-addr-util: introduce in6_addr_is_link_local()
Yu Watanabe [Wed, 17 Feb 2021 16:56:47 +0000 (01:56 +0900)] 
in-addr-util: introduce in6_addr_is_link_local()

4 years agoin-addr-util: introduce in_addr_is_set() or friends
Yu Watanabe [Wed, 17 Feb 2021 15:36:38 +0000 (00:36 +0900)] 
in-addr-util: introduce in_addr_is_set() or friends

4 years agonetwork: enumerate nexthops before routes
Yu Watanabe [Sun, 14 Feb 2021 18:29:55 +0000 (03:29 +0900)] 
network: enumerate nexthops before routes

Preparation for the later commits.
Routes may have RTA_NH_ID attribute. To resolve the nexthop ID, all
nexthops must be enumerated earlier.

4 years agonetwork: nexthop: first create nexthops with ID
Yu Watanabe [Fri, 5 Feb 2021 01:21:19 +0000 (10:21 +0900)] 
network: nexthop: first create nexthops with ID

Otherwise, an ID-less nexthop may conflict with a later nexthop with ID.

4 years agoportable: make PortableChangeType enum anonymous 18651/head
Lennart Poettering [Wed, 17 Feb 2021 09:47:30 +0000 (10:47 +0100)] 
portable: make PortableChangeType enum anonymous

Same reasons as previous commit.

4 years agoinstall: make UnitFileChangeType enum anonymous
Lennart Poettering [Wed, 17 Feb 2021 09:38:12 +0000 (10:38 +0100)] 
install: make UnitFileChangeType enum anonymous

We almost never use the named enum type, in almost all cases we use
"int" instead, since we overload it with negative errnos. To simplify
things, let's use "int" really everywhere.

Moreover, let's rename the fields for this enum to "type_or_errno", to
make the overloading clear. And let's ad some assertions that things are
in the right range.

4 years agoresolved: see if it's worth retrying a lookup on "failed-auxiliary" DNSSEC error 18640/head
Lennart Poettering [Thu, 12 Nov 2020 17:10:18 +0000 (18:10 +0100)] 
resolved: see if it's worth retrying a lookup on "failed-auxiliary" DNSSEC error

Maybe we learnt something about the server feature set, let's hence
retry.

Fixes: #11102
4 years agoresolved: in DNSSEC permissive mode, check if DO bit wasn't copied from request to...
Lennart Poettering [Thu, 12 Nov 2020 16:33:08 +0000 (17:33 +0100)] 
resolved: in DNSSEC permissive mode, check if DO bit wasn't copied from request to response

If the server doesn't copy the DO bit from request to response, this is
a very early and easy indication that it doesn#t support DNSSEC
properly. Hence, let's immediately downgrade to non-DNSSEC mode if we
see this – if permissive mode is on and this is allowed.

4 years agotest: avoid leaking open loop devices
Luca Boccassi [Tue, 16 Feb 2021 23:47:34 +0000 (23:47 +0000)] 
test: avoid leaking open loop devices

When a subshell is used ('make' or 'make all') the LOOPDEV environment
variable, which is used to store the opened loop device, is lost.
So the cleanup on trap/exit doesn't do anything, and the loop
device used to mount the test image is left around.

Avoid using a subshell to fix the issue.

4 years agoMerge pull request #18653 from yuwata/in-addr-prefix-nth
Lennart Poettering [Wed, 17 Feb 2021 17:52:24 +0000 (18:52 +0100)] 
Merge pull request #18653 from yuwata/in-addr-prefix-nth

in-addr-util: fix in_addr_prefix_nth() and use the function to get ip address range in firewall-util

4 years agoresolved: address DVE-2018-0001
Lennart Poettering [Thu, 12 Nov 2020 16:05:36 +0000 (17:05 +0100)] 
resolved: address DVE-2018-0001

This is an updated version of #8608 with more restrictive logic. To
quite the original bug:

    Some captive portals, lie and do not respond with the captive portal
    IP address, if the query is with EDNS0 enabled and D0 bit set to
    zero. Thus retry "secure" domain name look ups with less secure
    methods, upon NXDOMAIN.

https://github.com/dns-violations/dns-violations/blob/master/2018/DVE-2018-0001.md

Yes, this fix sucks hard, but I guess this is what we need to do to make
sure resolved works IRL.

Heavily based on the original patch from Dimitri John Ledkov, and I
copied the commentary verbatim.

Replaces: #8608