Yu Watanabe [Wed, 2 Dec 2020 06:15:50 +0000 (15:15 +0900)]
log-link: introduce log_interface_full_errno() macro
Yu Watanabe [Wed, 2 Dec 2020 06:00:06 +0000 (15:00 +0900)]
sd-ipv4acd,sd-ipv4ll: introduce _get_ifindex() and _get_ifname()
They will be used in later commits.
This also makes sd_ipv4acd_set_ifindex() check the existence of the interface.
Zbigniew Jędrzejewski-Szmek [Mon, 30 Nov 2020 09:19:52 +0000 (10:19 +0100)]
pager: stop disabling urlification under a pager
Less 568 properly shows urlified strings.
Putative NEWS entry:
* Urlification is now enabled by default even when a pager is used.
Previously it was disabled, because less would not show such markup
properly. This has been fixed in less 568.
Please either upgrade less, or use SYSTEMD_URLIFY=0 to disable the
feature.
Zbigniew Jędrzejewski-Szmek [Tue, 1 Dec 2020 20:59:30 +0000 (21:59 +0100)]
Merge pull request #17692 from yuwata/ipv4ll
network: fold ipv4ll fallback modes into normal ipv4ll addressing
Zbigniew Jędrzejewski-Szmek [Tue, 1 Dec 2020 20:47:43 +0000 (21:47 +0100)]
Merge pull request #17703 from poettering/event-ratelimit
sd-event: add a concept of ratelimiting
Zbigniew Jędrzejewski-Szmek [Tue, 1 Dec 2020 20:38:52 +0000 (21:38 +0100)]
Merge pull request #17524 from poettering/fileio-offset
cryptsetup: if keyfile is specified as AF_UNIX socket in the fs, connect to it, and read key data from it
Lennart Poettering [Mon, 23 Nov 2020 21:30:09 +0000 (22:30 +0100)]
man: document new ratelimiting APIs
Michal Sekletár [Thu, 9 Jul 2020 16:16:44 +0000 (18:16 +0200)]
core: prevent excessive /proc/self/mountinfo parsing
Michal Sekletár [Mon, 23 Nov 2020 17:04:57 +0000 (18:04 +0100)]
test: add ratelimiting test
(Taken from Michal's #17274 by Lennart, and slightly adjusted)
Lennart Poettering [Mon, 23 Nov 2020 17:02:40 +0000 (18:02 +0100)]
sd-event: add ability to ratelimit event sources
Let's a concept of "rate limiting" to event sources: if specific event
sources fire too often in some time interval temporarily take them
offline, and take them back online once the interval passed.
This is a simple scheme of avoiding starvation of event sources if some
event source fires too often.
This introduces the new conceptual states of "offline" and "online" for
event sources: an event source is "online" only when enabled *and* not
ratelimited, and offline in all other cases. An event source that is
online hence has its fds registered in the epoll, its signals in the
signalfd and so on.
Lennart Poettering [Mon, 23 Nov 2020 16:49:27 +0000 (17:49 +0100)]
sd-event: remove earliest_index/latest_index into common part of event source objects
So far we used these fields to organize the earliest/latest timer event
priority queue. In a follow-up commit we want to introduce ratelimiting
to event sources, at which point we want any kind of event source to be
able to trigger time wakeups, and hence they all need to be included in
the earliest/latest prioqs. Thus, in preparation let's make this
generic.
No change in behaviour, just some shifting around of struct members from
the type-specific to the generic part.
Lennart Poettering [Mon, 23 Nov 2020 16:47:16 +0000 (17:47 +0100)]
sd-event: follow coding style with naming return parameter
Lennart Poettering [Mon, 23 Nov 2020 14:38:00 +0000 (15:38 +0100)]
sd-event: ref event loop while in sd_event_prepare() ot sd_event_run()
sd_event_prepare() invokes callbacks that might drop the last user ref
on our event loop. Let's make sure we keep an explicit ref around it, so
that we won't end up with an invalid pointer. Similar in sd_event_run().
Basically, any function that is publically callable that might end up
invoking callbacks should ref the relevant objects to be protected
against callbacks destroying these objects while we still want to access
them. We did this correctly in sd_event_dispatch() and sd_event_loop(),
but these are not the only ones which are callable from the outside.
Lennart Poettering [Mon, 23 Nov 2020 14:33:50 +0000 (15:33 +0100)]
sd-event: let's suffix last_run/last_log with "_usec"
Otherwise it's a bit confusing what this is about: two timestamps.
Lennart Poettering [Mon, 23 Nov 2020 14:25:35 +0000 (15:25 +0100)]
sd-event: split out code to add/remove timer event sources to earliest/latest prioq
Just some refactoring that makes code prettier, and will come handy
later, because we can reuse these functions at more places.
Lennart Poettering [Mon, 23 Nov 2020 10:40:24 +0000 (11:40 +0100)]
sd-event: split clock data allocation out of sd_event_add_time()
Just some simple refactoring, that will make things easier for us later.
But it looks better this way even without the later function reuse.
Lennart Poettering [Mon, 23 Nov 2020 10:39:40 +0000 (11:39 +0100)]
sd-event: mention that two debug logged events are ignored
Lennart Poettering [Wed, 4 Nov 2020 17:43:12 +0000 (18:43 +0100)]
update TODO
Lennart Poettering [Tue, 1 Dec 2020 13:23:38 +0000 (14:23 +0100)]
man: drop comment about ECC vs. RSA and Yubikey
The comment is pointless, ECC systematically doesn't allow
encryption/decryption directly, only RSA does that. If you want to use
ECC for asymmetric encryption/decryption you have to combine it with key
exchange scheme and symmetric scheme. This all is not a limitation of
the Yubikey, hence don't claim so. It's just how ECC is.
Lennart Poettering [Wed, 4 Nov 2020 19:20:41 +0000 (20:20 +0100)]
man: document how cryptsetup keys may be acquired via AF_UNIX sockets
Lennart Poettering [Wed, 4 Nov 2020 17:15:42 +0000 (18:15 +0100)]
cryptsetup: modify keyfile search logic to use read_file_full() too
Let's move the 3rd way how cryptsetup acquires key files to
read_file_full() too.
Since load_key_file()'s raison d'etre now is just the search path logic,
let's rename the function to find_key_file().
Lennart Poettering [Wed, 4 Nov 2020 16:24:53 +0000 (17:24 +0100)]
cryptsetup: port cryptsetup's main key file logic over to read_full_file_full()
Previously, we'd load the file with libcryptsetup's calls. Let's do that
in our own, so that we can make use of READ_FULL_FILE_CONNECT_SOCKET,
i.e. read in keys via AF_UNIX sockets, so that people can plug key
providers into our logic.
This provides functionality similar to Debian's keyscript= crypttab
option (see → #3007), as it allows key scripts to be run as socket
activated services, that have stdout connected to the activated socket.
In contrast to traditional keyscript= support this logic runs stuff out
of process however, which is beneficial, since it allows sandboxing and
similar.
Lennart Poettering [Wed, 4 Nov 2020 16:22:39 +0000 (17:22 +0100)]
cryptsetup: port PKCS#11 code to read key file with read_full_file()
Now that we can read from offsets/with size, let's port the cryptsetup
PKCS#11 key file logic over to read_full_file_full().
Lennart Poettering [Wed, 4 Nov 2020 19:25:06 +0000 (20:25 +0100)]
fileio: teach read_full_file_full() to read from offset/with maximum size
Lennart Poettering [Wed, 4 Nov 2020 19:24:57 +0000 (20:24 +0100)]
journal-remote: suffix cmdline option that expects arg with =
Lennart Poettering [Wed, 4 Nov 2020 15:23:11 +0000 (16:23 +0100)]
man: mention that --key= is about *secret* keys
Lennart Poettering [Wed, 4 Nov 2020 15:21:26 +0000 (16:21 +0100)]
journal-remote: use READ_FULL_FILE_SECURE|READ_FULL_FILE_WARN_WORLD_READABLE when reading PEM secret key
It's secret data, hence use the appropriate flags.
Lennart Poettering [Wed, 4 Nov 2020 15:19:49 +0000 (16:19 +0100)]
repart: warn about world writable key files
We have easy support for this, hence use it for privileged key data.
Lennart Poettering [Wed, 4 Nov 2020 15:17:26 +0000 (16:17 +0100)]
dissect-image: use simple version of read_full_file() where we can
Lennart Poettering [Wed, 4 Nov 2020 15:13:09 +0000 (16:13 +0100)]
journal-remote: erase secret PEM key from memory after use
Franck Bui [Mon, 30 Nov 2020 14:26:15 +0000 (15:26 +0100)]
scope: on unified, make sure to unwatch all PIDs once they've been moved to the cgroup scope
Commit
428a9f6f1d0396b9eacde2b38d667cbe3f15eb55 freed u->pids which is
problematic since the references to this unit in m->watch_pids were no more
removed when the unit was freed.
This patch makes sure to clean all this refs up before freeing u->pids by
calling unit_unwatch_all_pids().
Vito Caputo [Tue, 1 Dec 2020 08:26:54 +0000 (00:26 -0800)]
sd-event: fix delays assert brain-o (#17790)
s/sizeof/ELEMENTSOF/
Bug introduced in
34b87517749caa4142b19eb3c63bdf349fafbc49.
Pavel Sapezhko [Mon, 9 Nov 2020 19:40:14 +0000 (22:40 +0300)]
mkosi: make ubuntu image bootable by default
igo95862 [Fri, 27 Nov 2020 13:51:18 +0000 (16:51 +0300)]
man: Speicfy exact return values of sd_bus_message_enter_container
Piotr Drąg [Sat, 28 Nov 2020 12:43:52 +0000 (13:43 +0100)]
po: add units/systemd-journald.service.in to POTFILES.skip
Michał Kopeć [Sun, 29 Nov 2020 20:13:07 +0000 (21:13 +0100)]
hwdb: add axis range corrections for Lenovo ThinkPad T14 Gen1
Yu Watanabe [Mon, 23 Nov 2020 13:34:43 +0000 (22:34 +0900)]
network: use IN_SET() macro
Follow-up for
1d370b2c182505ff8033fccbebcc56621d305220.
Yu Watanabe [Mon, 23 Nov 2020 04:42:22 +0000 (13:42 +0900)]
network: treat IPv4LL is one of dynamic addressing protocol
This makes an IPv4LL address optional when multiple dynamic
addressing protocols are enabled.
Yu Watanabe [Mon, 23 Nov 2020 04:44:29 +0000 (13:44 +0900)]
network: simplify the condition about ipv4ll is enabled or not
Yu Watanabe [Mon, 23 Nov 2020 04:55:26 +0000 (13:55 +0900)]
network: shorten link_check_ready() a bit
Yu Watanabe [Mon, 23 Nov 2020 04:28:47 +0000 (13:28 +0900)]
network: stop IPv4LL engine when DHCPv4 address is successfully acquired
Zbigniew Jędrzejewski-Szmek [Thu, 8 Oct 2020 18:14:51 +0000 (20:14 +0200)]
networkd: start ipv4ll when dhcp has trouble getting a lease
Fixes #13316.
Zbigniew Jędrzejewski-Szmek [Thu, 8 Oct 2020 14:51:25 +0000 (16:51 +0200)]
sd-dhcp-client: report transient DHCP failure to the caller
So far we only reported major state transitions like failure to acquire
the message. Let's report the initial failure after a few timeouts in
a new event type.
The number of timeouts is hardcoded as 3, since Windows seems to be using
that. I don't think we need to make this configurable out of the box. A
reasonable default may be enough.
Zbigniew Jędrzejewski-Szmek [Thu, 8 Oct 2020 14:59:26 +0000 (16:59 +0200)]
networkd: merge ll addressing fallback modes into normal "boolean" values
They are not really boolean, because we have both ipv4 and ipv6, but
for each protocol we have either unset, no, and yes.
From https://github.com/systemd/systemd/issues/13316#issuecomment-
582906817:
LinkLocalAddressing must be a boolean option, at least for ipv4:
- LinkLocalAddressing=no => no LL at all.
- LinkLocalAddressing=yes + Static Address => invalid configuration, warn and
interpret as LinkLocalAddressing=no, no LL at all.
(we check that during parsing and reject)
- LinkLocalAddressing=yes + DHCP => LL process should be subordinated to the
DHCP one, an LL address must be acquired at start or after a short N
unsuccessful DHCP attemps, and must not stop DHCP to keeping trying. When a
DHCP address is acquired, drop the LL address. If the DHCP address is lost,
re-adquire a new LL address.
(next patch will move in this direction)
- LinkLocalAddressing=fallback has no reason to exist, because LL address must
always be allocated as a fallback option when using DHCP. Having both DHCP
and LL address at the same time is an RFC violation, so
LinkLocalAdressing=yes correctly implemented is already the "fallback"
behavior. The fallback option must be deprecated and if present in older
configs must be interpreted as LinkLocalAddressing=yes.
(removed)
- And for IPv6, the LinkLocalAddress option has any sense at all? IPv6-LL
address aren't required to be always set for every IPv6 enabled interface (in
this case, coexisting with static or dynamic address if any)? Shouldn't be
always =yes?
(good question)
This effectively reverts
29e81083bd2fcb2dbf83f67ef358c7d25adf7e9d. There is no
special "fallback" mode now, so the check doesn't make sense anymore.
Zbigniew Jędrzejewski-Szmek [Wed, 7 Oct 2020 12:14:09 +0000 (14:14 +0200)]
sd-dhcp-client: minor simplification
Zbigniew Jędrzejewski-Szmek [Wed, 7 Oct 2020 12:13:39 +0000 (14:13 +0200)]
man: adjust description of MaxAttempts
The code was changed in
715cedfbf03a2eb1d4dca5d1b2b876e52a3b652d to allow more than
six attempts and the old description stopped making sense.
Yu Watanabe [Sat, 28 Nov 2020 20:32:33 +0000 (05:32 +0900)]
Merge pull request #17761 from keszybz/documentation-followups
Two tiny fixlets
nihilix-melix [Fri, 27 Nov 2020 10:21:22 +0000 (11:21 +0100)]
Update logind-button.c
Zbigniew Jędrzejewski-Szmek [Sat, 28 Nov 2020 10:27:31 +0000 (11:27 +0100)]
test-networkd-conf: add missing assert_se
Coverity CID#
1437351. Fixup for
f706340979a.
Frantisek Sumsal [Fri, 27 Nov 2020 20:01:32 +0000 (21:01 +0100)]
semaphore: temporarily disable the timedated test suite
All otherwise passing Semaphore CI builds are now getting stuck on the
timedated test suite. Let's temporarily skip it until the issue is
resolved.
See: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975010
Konomi [Fri, 27 Nov 2020 07:52:44 +0000 (18:52 +1100)]
hwdb: 60-keyboard: Add Dell Inspiron 11 3168 Fn+Home/End/PageUp/PageDown key mappings
On the Dell Inspiron 11 3168 the Fn and Arrow Keys control the Home, End, Page Up and Page Down keys. This commit allows those keys to work correctly.
Zbigniew Jędrzejewski-Szmek [Fri, 27 Nov 2020 12:12:23 +0000 (13:12 +0100)]
Merge pull request #17734 from yuwata/parse-hwdb
hwdb: add missing Group()
Zbigniew Jędrzejewski-Szmek [Fri, 27 Nov 2020 11:55:37 +0000 (12:55 +0100)]
Merge pull request #17732 from yuwata/core-use-synthetic_errno
core,network: use SYNTHETIC_ERRNO() macro
Zbigniew Jędrzejewski-Szmek [Fri, 27 Nov 2020 11:51:48 +0000 (12:51 +0100)]
NEWS: really fix kernel version number reference
Fixes #17736.
Yu Watanabe [Thu, 26 Nov 2020 23:47:26 +0000 (08:47 +0900)]
coccinelle: ignore specific cases to use SYNTHETIC_ERRNO() macro
Yu Watanabe [Thu, 26 Nov 2020 23:39:24 +0000 (08:39 +0900)]
cryptsetup: drop unnecessary bracket
Yu Watanabe [Thu, 26 Nov 2020 23:38:12 +0000 (08:38 +0900)]
test: use for(;;) instead of while(true)
Yu Watanabe [Thu, 26 Nov 2020 23:36:09 +0000 (08:36 +0900)]
core/scope: use set_ensure_put()
Yu Watanabe [Thu, 26 Nov 2020 23:34:51 +0000 (08:34 +0900)]
mount-util: use mfree()
Yu Watanabe [Thu, 26 Nov 2020 23:29:20 +0000 (08:29 +0900)]
oom: use CMP() macro
Yu Watanabe [Thu, 26 Nov 2020 08:54:39 +0000 (17:54 +0900)]
core: fix typo
Yu Watanabe [Thu, 26 Nov 2020 05:41:00 +0000 (14:41 +0900)]
coccinelle: add rules for log_unit_error_errno() or friends
Yu Watanabe [Thu, 26 Nov 2020 23:18:32 +0000 (08:18 +0900)]
network: fix return values
Yu Watanabe [Thu, 26 Nov 2020 23:18:18 +0000 (08:18 +0900)]
network: use SYNTHETIC_ERRNO() macro
Yu Watanabe [Thu, 26 Nov 2020 00:27:21 +0000 (09:27 +0900)]
core: use SYNTHETIC_ERRNO() macro
Yu Watanabe [Thu, 26 Nov 2020 00:27:05 +0000 (09:27 +0900)]
core/timer: drop unnecessary brackets
Yu Watanabe [Fri, 27 Nov 2020 00:08:01 +0000 (09:08 +0900)]
Merge pull request #17474 from yuwata/network-drop-link-deserialization-logic
network: drop link deserialization logic
Yu Watanabe [Fri, 27 Nov 2020 00:04:19 +0000 (09:04 +0900)]
Merge pull request #17478 from yuwata/split-network-internal
libsystemd-network: split network-internal.c
Pavel Sapezhko [Tue, 24 Nov 2020 13:44:07 +0000 (16:44 +0300)]
resolved: allow cache responses from local DNS servers
Christian Hesse [Thu, 26 Nov 2020 20:29:30 +0000 (21:29 +0100)]
oom: fix oomd.conf install location
The file is read in pkgsysconfdir, so install it there.
Christian Hesse [Thu, 26 Nov 2020 20:22:41 +0000 (21:22 +0100)]
home: fix homed.conf install location
The install location changed in
d7aa78c32f076c305ceeb183fc06eb1de0960deb,
I think this was not intentional. Keep the condition but revert the path.
Yu Watanabe [Thu, 26 Nov 2020 21:00:11 +0000 (06:00 +0900)]
hwdb: add missing Group()
This fixes the following warning:
```
parse_hwdb.py:120: UserWarning: warn_ungrouped_named_tokens_in_collection: setting results name 'SETTINGS*' on And expression collides with 'HZ' on contained expression
dpi_setting = (Optional('*')('DEFAULT') + INTEGER('DPI') + Suppress('@') + INTEGER('HZ'))('SETTINGS*')
```
Not sure about for the mount_matrix, but LGTM.com warns in that line,
and, adding Group() does not change the parse result.
Yu Watanabe [Thu, 26 Nov 2020 20:59:56 +0000 (05:59 +0900)]
hwdb: enable diagnostic switches
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 18:00:50 +0000 (19:00 +0100)]
Merge pull request #17738 from keszybz/hwdb-news-update-v247
Update hwdb and news for v247
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 10:23:54 +0000 (11:23 +0100)]
shared/seccomp-util: address family filtering is broken on ppc
This reverts the gist of
da1921a5c396547261c8c7fcd94173346eb3b718 and
0d9fca76bb69e162265b2d25cb79f1890c0da31b (for ppc).
Quoting #17559:
> libseccomp 2.5 added socket syscall multiplexing on ppc64(el):
> https://github.com/seccomp/libseccomp/pull/229
>
> Like with i386, s390 and s390x this breaks socket argument filtering, so
> RestrictAddressFamilies doesn't work.
>
> This causes the unit test to fail:
> /* test_restrict_address_families */
> Operating on architecture: ppc
> Failed to install socket family rules for architecture ppc, skipping: Operation canceled
> Operating on architecture: ppc64
> Failed to add socket() rule for architecture ppc64, skipping: Invalid argument
> Operating on architecture: ppc64-le
> Failed to add socket() rule for architecture ppc64-le, skipping: Invalid argument
> Assertion 'fd < 0' failed at src/test/test-seccomp.c:424, function test_restrict_address_families(). Aborting.
>
> The socket filters can't be added so `socket(AF_UNIX, SOCK_DGRAM, 0);` still
> works, triggering the assertion.
Fixes #17559.
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 13:01:09 +0000 (14:01 +0100)]
NEWS: fix kernel version number reference
Fixes #17736.
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 12:45:06 +0000 (13:45 +0100)]
NEWS: version 247
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 12:54:08 +0000 (13:54 +0100)]
hwdb: update chromiumos autosuspend rules
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 12:53:03 +0000 (13:53 +0100)]
hwdb: update for v247
Only some small changes, because we updated recently. As usual, it seems that there are mostly
additions with a smaller amount of corrections, no big removals.
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 12:48:35 +0000 (13:48 +0100)]
docs/RELEASE: clarify which steps are done when
Dan Streetman [Wed, 25 Nov 2020 20:22:24 +0000 (15:22 -0500)]
test: use cap_last_cap() for max supported cap number, not capability_list_length()
This test assumes capability_list_length() is an invalid cap number,
but that isn't true if the running kernel supports more caps than we were
compiled with, which results in the test failing.
Instead use cap_last_cap() + 1.
If cap_last_cap() is 63, there are no more 'invalid' cap numbers to test with,
so the invalid cap number test part is skipped.
Whired Planck [Thu, 26 Nov 2020 11:35:55 +0000 (12:35 +0100)]
Translated using Weblate (Chinese (Simplified))
Currently translated at 83.9% (157 of 187 strings)
Co-authored-by: Whired Planck <fungdaat31@outlook.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/zh_CN/
Translation: systemd/master
Zbigniew Jędrzejewski-Szmek [Thu, 26 Nov 2020 11:48:05 +0000 (12:48 +0100)]
Merge pull request #17622 from yuwata/udev-database-set-udev-version
sd-device: make sd_device_has_current_tag() compatible with udev database generated by older udevd
Lee Whalen [Thu, 26 Nov 2020 04:31:47 +0000 (20:31 -0800)]
add touchpad-edge-detect output for the Lenovo Thinkpad Extreme to evdev.hwdb
Yu Watanabe [Thu, 26 Nov 2020 00:31:10 +0000 (09:31 +0900)]
Merge pull request #17709 from yuwata/test-seccomp-skip
test: skip several tests in test-seccomp when running under valgrind or ASAN
Yu Watanabe [Mon, 16 Nov 2020 10:47:42 +0000 (19:47 +0900)]
sd-device: make sd_device_has_current_tag() and friends compatible with database version 0
Yu Watanabe [Wed, 25 Nov 2020 21:23:14 +0000 (06:23 +0900)]
sd-device: introduce database version and save it in udev database V field
Yu Watanabe [Mon, 16 Nov 2020 10:28:40 +0000 (19:28 +0900)]
sd-device: make device_add_property_internal() inline
Yu Watanabe [Wed, 25 Nov 2020 13:20:48 +0000 (22:20 +0900)]
man: slightly update the man page of sd_bus_message_read_basic()
Follow-up for
73a1d7d2433edd1872ec53db3e804009298ebb1d.
igo95862 [Wed, 25 Nov 2020 13:15:33 +0000 (16:15 +0300)]
man: Fixed an incomplete sentence
igo95862 [Wed, 25 Nov 2020 12:53:52 +0000 (15:53 +0300)]
man: Specify that sd_bus_message_read_basic returns 0 if end of array had been reached.
Lennart Poettering [Fri, 20 Nov 2020 11:33:16 +0000 (12:33 +0100)]
docs: document what VPNs should do to systemd-resolved.service
Fixes: #17588 #17512
Prompted-by: #17529
(Also relevant: #6076)
Yu Watanabe [Tue, 17 Nov 2020 00:13:59 +0000 (09:13 +0900)]
core/mount: mount command may fail after adding the corresponding proc mountinfo entry
Hopefully fixes #17617.
Zbigniew Jędrzejewski-Szmek [Wed, 25 Nov 2020 12:22:56 +0000 (13:22 +0100)]
Merge pull request #17715 from yuwata/specifier-follow-ups
Sort specifiers
Lennart Poettering [Tue, 24 Nov 2020 12:56:48 +0000 (13:56 +0100)]
cryptsetup: use log_warning_errno() where we can, instead of log_warning()
Zbigniew Jędrzejewski-Szmek [Wed, 25 Nov 2020 12:20:42 +0000 (13:20 +0100)]
Merge pull request #17721 from poettering/more-strjoin-cryptsetup
two minor fixes/clean-ups
Lennart Poettering [Tue, 17 Nov 2020 17:35:08 +0000 (18:35 +0100)]
mkosi: make sure our mkosi files work with f33
Yu Watanabe [Tue, 24 Nov 2020 12:07:42 +0000 (21:07 +0900)]
test: skip several tests in test-seccomp when running on asan
Yu Watanabe [Tue, 24 Nov 2020 11:58:07 +0000 (20:58 +0900)]
test: skip several tests in test-seccomp when running on valgrind
Pavel Sapezhko [Wed, 18 Nov 2020 14:54:01 +0000 (17:54 +0300)]
man: clarify DefaultTasksMax doc