Frantisek Sumsal [Thu, 10 Feb 2022 11:29:53 +0000 (12:29 +0100)]
test: accept GC'ed units in newer LVM
Since lvm 2.03.15 the transient units are started without `-r`, thus
disappearing once they finish and breaking the test (which expects them
to remain loaded after finishing). Let's accept `LoadState=not-found` as
a valid result as well to fix this.
Follow-up to:
d10d562bd4b9f93130fb2b23f2b0d0d4126ea7d4
See: https://sourceware.org/git/?p=lvm2.git;a=commit;h=
fbd8b0cf43dc67f51f86f060dce748f446985855
Yu Watanabe [Thu, 10 Feb 2022 11:40:04 +0000 (20:40 +0900)]
Merge pull request #22471 from yuwata/network-bridge-vlan-protocol
network: bridge: fix vlan protocol
Yu Watanabe [Thu, 10 Feb 2022 11:38:56 +0000 (20:38 +0900)]
Merge pull request #22452 from yuwata/network-ipv6ll
network: use sysctl to set IPv6LL address generation mode when the interface is already up
Yu Watanabe [Thu, 10 Feb 2022 09:04:34 +0000 (18:04 +0900)]
test-network: add missing tests for bridge properties
Yu Watanabe [Thu, 10 Feb 2022 08:47:14 +0000 (17:47 +0900)]
network: bridge: fix endian of vlan protocol
Fixes #22469.
Yu Watanabe [Tue, 8 Feb 2022 14:53:43 +0000 (23:53 +0900)]
test-network: add testcase for re-generating IPv6LL address
Joerie de Gram [Tue, 8 Feb 2022 13:56:26 +0000 (22:56 +0900)]
network: attempt to trigger kernel IPv6LL address generation
Try to ensure kernel IPv6 link local address generation occurs by
setting the per-if addr_gen_mode sysctl when the link is already up,
instead of the netlink interface (IFLA_INET6_ADDR_GEN_MODE).
The netlink setting is sufficient in cases where the interface is not
yet up when networkd configures an interface - bringing the interface
up will trigger in-kernel address generation.
If the interface is already up, yet the interface has no IPv6LL assigned
setting IFLA_INET6_ADDR_GEN_MODE has no effect.
Writing the addr_gen_mode sysctl is a best effort attempt at triggering
address generation regardless of interface state because it also works
in cases where the interface is already up.
Fixes #22424.
Yu Watanabe [Tue, 8 Feb 2022 13:53:33 +0000 (22:53 +0900)]
network: move link_set_ipv6ll_stable_secret() to networkd-ipv6ll.c
Yu Watanabe [Tue, 8 Feb 2022 13:27:17 +0000 (22:27 +0900)]
network: skip to set IPv6LL address generation mode if the requested mode is already set
Yu Watanabe [Tue, 8 Feb 2022 17:14:12 +0000 (02:14 +0900)]
network: use log_link_warning_errno() or friends where applicable
Yu Watanabe [Tue, 8 Feb 2022 13:26:23 +0000 (22:26 +0900)]
network: monitor current IPv6LL address generation mode
Yu Watanabe [Tue, 8 Feb 2022 13:16:38 +0000 (22:16 +0900)]
network: introduce two helper functions for setting IPv6LL address generation mode
Alvin Šipraga [Thu, 10 Feb 2022 07:19:28 +0000 (08:19 +0100)]
udev/net: support Match.Firmware= in .link files (#22462)
In
cbcdcaaa0ec5 ("Add support for conditions on the machines firmware")
a new Firmware= directive was added for .netdev and .network files.
While it was also documented to work on .link files, in actual fact the
support was missing. Add that one extra line to make it work, and also
update the fuzzer directives.
Anita Zhang [Thu, 10 Feb 2022 01:10:06 +0000 (17:10 -0800)]
Merge pull request #22467 from mrc0mmand/TEST-64-lvm-static-autoactivation
test: lvm 2.03.15 dropped the static autoactivation
Frantisek Sumsal [Wed, 9 Feb 2022 21:35:03 +0000 (22:35 +0100)]
test: lvm 2.03.15 dropped the static autoactivation
so install the respective generator only if we're running with older
lvm versions.
See: https://sourceware.org/git/?p=lvm2.git;a=commit;h=
ee8fb0310c53ed003a43b324c99cdfd891dd1a7c
Federico Ceratto [Wed, 9 Feb 2022 20:34:29 +0000 (20:34 +0000)]
Clarify protocol used in systemd-journal-upload (#22465)
* Clarify protocol used in systemd-journal-upload
Luca Boccassi [Wed, 9 Feb 2022 16:59:14 +0000 (16:59 +0000)]
Merge pull request #22458 from poettering/parse-safe-string
some safety tweaks to conf-parser.[ch]
Luca Boccassi [Tue, 8 Feb 2022 13:19:52 +0000 (13:19 +0000)]
meson: disable export-dbus-interfaces target when cross-compiling
ERROR:
Cannot use target systemd as a generator because it is built for the
host machine and no exe wrapper is defined or needs_exe_wrapper is
true. You might want to set `native: true` instead to build it for
the build machine.
Evgeny Vereshchagin [Tue, 8 Feb 2022 20:35:17 +0000 (20:35 +0000)]
ci: remove MULTI_STATUS from superlinter
Judging by
ERROR! Failed to call GitHub Status API!
it doesn't seem to work. Even if it did it would just clutter the status
checks I think so let's just remove MULTI_STATUS along with
GITHUB_TOKEN.
Yu Watanabe [Wed, 9 Feb 2022 09:57:37 +0000 (18:57 +0900)]
Merge pull request #22248 from yuwata/network-tc-use-request-queue
network: tc: use request queue to configure QDisc or TClass
Lennart Poettering [Wed, 9 Feb 2022 09:13:59 +0000 (10:13 +0100)]
conf-parser: add specific parser for PID values
Lennart Poettering [Wed, 9 Feb 2022 09:07:17 +0000 (10:07 +0100)]
tree-wide: use config_parse_safe_string() at various places
Lennart Poettering [Wed, 9 Feb 2022 08:55:21 +0000 (09:55 +0100)]
conf-parser: update config_item_*_lookup() to follow modern coding style
Let's rename the return parameters ret_xyz, and always initialize them
if we return >= 0, as per our current coding style.
Lennart Poettering [Wed, 9 Feb 2022 08:47:53 +0000 (09:47 +0100)]
conf-parser: refuse section headers with control characters early, just in case
Lennart Poettering [Wed, 9 Feb 2022 08:47:50 +0000 (09:47 +0100)]
conf-parser: minor refactorings/modernizations
Lennart Poettering [Wed, 9 Feb 2022 08:47:10 +0000 (09:47 +0100)]
conf-parser: use _cleanup_free_ where appropriate
Lennart Poettering [Wed, 9 Feb 2022 08:45:12 +0000 (09:45 +0100)]
conf-parse: add generic config_parse_safe_string() helper
This helper is just like config_parse_string() but does some superficial
checks for control characters and quotes.
In most cases we currently use config_parse_string() we probably want to
use config_parse_safe_string() for safety reasons.
Santa Wiryaman [Mon, 3 May 2021 22:48:26 +0000 (18:48 -0400)]
Add support for `isolated` parameter
Add the "Isolated" parameter in the *.network file, e.g.,
[Bridge]
Isolated=true|false
When the Isolated parameter is true, traffic coming out of this port
will only be forward to other ports whose Isolated parameter is false.
When Isolated is not specified, the port uses the kernel default
setting (false).
The "Isolated" parameter was introduced in Linux 4.19.
See man bridge(8) for more details.
But even though the kernel and bridge/iproute2 recognize the "Isolated"
parameter, systemd-networkd did not have a way to set it.
Evgeny Vereshchagin [Tue, 8 Feb 2022 17:34:10 +0000 (17:34 +0000)]
ci: validate actions and fix actionlint warnings
some actions like Coverity and CFLite aren't run on every PR so to make
sure they are more or less fine when they are changed it makes sense to
at least check them with superlinter/actionlint: https://github.com/rhysd/actionlint
The following warnings were fixed along the way:
```
.github/workflows/mkosi.yml:55:7: shellcheck reported issue in this script: SC2086:info:6:14: Double quote to prevent globbing and word splitting [shellcheck]
|
55 | run: |
| ^~~~
.github/workflows/mkosi.yml:55:7: shellcheck reported issue in this script: SC2046:warning:6:40: Quote this to prevent word splitting [shellcheck]
|
55 | run: |
| ^~~~
.github/workflows/mkosi.yml:55:7: shellcheck reported issue in this script: SC2006:style:6:40: Use $(...) notation instead of legacy backticked `...` [shellcheck]
|
55 | run: |
| ^~~~
```
```
.github/workflows/coverity.yml:31:9: shellcheck reported issue in this script: SC2086:info:1:93: Double quote to prevent globbing and word splitting [shellcheck]
|
31 | run: echo "COVERITY_SCAN_NOTIFICATION_EMAIL=$(git log -1 ${{ github.sha }} --pretty=\"%aE\")" >> $GITHUB_ENV
| ^~~~
```
Yu Watanabe [Wed, 26 Jan 2022 04:06:37 +0000 (13:06 +0900)]
network: tc: use hashmap to store traffic control settings in .network files
As now each qdisc or tclass is configured when it is ready.
Yu Watanabe [Wed, 26 Jan 2022 04:01:19 +0000 (13:01 +0900)]
network: tc: introduce order dependency of traffic control
Yu Watanabe [Tue, 25 Jan 2022 18:49:27 +0000 (03:49 +0900)]
network: tc: use request queue to configure traffic control
But no dependency resolution is implemented.
Yu Watanabe [Wed, 26 Jan 2022 03:18:47 +0000 (12:18 +0900)]
network: tc/teql: set tca_kind in verify()
Then, qdisc_configure() can be simplified.
Yu Watanabe [Tue, 25 Jan 2022 23:42:22 +0000 (08:42 +0900)]
network: tc: monitor qdisc and tclass
Yu Watanabe [Wed, 26 Jan 2022 01:24:50 +0000 (10:24 +0900)]
sd-netlink: allow to dump qdisc and tclass
Yu Watanabe [Wed, 26 Jan 2022 00:53:40 +0000 (09:53 +0900)]
sd-netlink: make traffic control related message can be monitored
Yu Watanabe [Tue, 25 Jan 2022 21:04:16 +0000 (06:04 +0900)]
sd-netlink: introduce sd_rtnl_message_traffic_control_get_{ifindex,parent,handle}()
Yu Watanabe [Tue, 25 Jan 2022 21:00:55 +0000 (06:00 +0900)]
sd-netlink: unify sd_rtnl_message_new_qdisc() and sd_rtnl_message_new_tclass()
As the netlink message header types for both qdisc and tclass are
equivalent.
Yu Watanabe [Wed, 26 Jan 2022 05:28:17 +0000 (14:28 +0900)]
network: coding style fixes
Yu Watanabe [Tue, 25 Jan 2022 21:42:23 +0000 (06:42 +0900)]
network: tc: drop unnecessary conditions
As TC_H_UNSPEC is 0.
Yu Watanabe [Tue, 25 Jan 2022 20:52:54 +0000 (05:52 +0900)]
network: tc: drop unused QDisc::family element
Eduard Tolosa [Thu, 3 Feb 2022 18:25:57 +0000 (13:25 -0500)]
Update footer.html
Lennart Poettering [Tue, 8 Feb 2022 20:57:38 +0000 (21:57 +0100)]
Merge pull request #22446 from poettering/sd-boot-cpuid-vm-tscd
sd-boot: don't read TSC in VM environments, and other TSC fixes
Yu Watanabe [Tue, 8 Feb 2022 12:56:02 +0000 (21:56 +0900)]
network: move ipv6ll related functions to networkd-ipv6ll.[ch]
Yu Watanabe [Tue, 8 Feb 2022 16:23:07 +0000 (01:23 +0900)]
Merge pull request #22448 from poettering/coredump-raise-sizes
coredump: raise limits
Yu Watanabe [Sat, 22 Jan 2022 18:07:52 +0000 (03:07 +0900)]
Revert "ci: switch to fedora-35 on i386 on Packit"
This reverts commit
478c632e00ffbf50012b1946a8a025494c012353.
Yu Watanabe [Sat, 22 Jan 2022 18:07:18 +0000 (03:07 +0900)]
Revert "packit: switch the remaining jobs to F35"
This reverts commit
e7642152ae6e867fc569206e905464321a41e58a.
Yu Watanabe [Fri, 4 Feb 2022 04:06:27 +0000 (13:06 +0900)]
udev/net: support to set MDI-X mode
Closes #22386.
Lennart Poettering [Tue, 8 Feb 2022 13:47:00 +0000 (14:47 +0100)]
Merge pull request #22423 from poettering/repart-sector-size
repart: fix sector size handling
Curtis Klein [Sun, 10 Oct 2021 01:18:54 +0000 (18:18 -0700)]
watchdog: saturate to kernel's max watchdog timeout
Since version 4.5, the max possible timeout is UINT_MAX / 1000 since it
does calculations in milliseconds. A small helper function is added to
make this conversion and saturation and will be used more in the next
commit.
Also document the usage of signed integers by the kernel userspace API.
Lennart Poettering [Tue, 8 Feb 2022 13:29:24 +0000 (14:29 +0100)]
Merge pull request #22442 from DaanDeMeyer/fix-entry-iteration
journal: Fix entry array iteration in case of corruption
Daan De Meyer [Tue, 8 Feb 2022 13:03:03 +0000 (13:03 +0000)]
Merge pull request #22366 from poettering/journal-file-punch-fix
journald: some journal file hole punching fixes
Lennart Poettering [Tue, 8 Feb 2022 10:35:10 +0000 (11:35 +0100)]
sd-boot: don't use TSC in virtualized environments
Replaces:
f699bd81e8e18da2d2fc11e7fb7dce95f8bb3f9e
Fixes: #22060
Lennart Poettering [Tue, 8 Feb 2022 10:27:48 +0000 (11:27 +0100)]
sd-boot: return 0 (not 1) from ticks_read() in fallback implementation
The single consumer of ticks_read() (i.e. time_usec()) checks for == 0
to detect the "not supported/invalid" case, hence actually return the
right value for that.
Lennart Poettering [Tue, 8 Feb 2022 10:26:49 +0000 (11:26 +0100)]
sd-boot: encapsulate freq cache in ticks_freq()
It's usually nicer to abstract a cache away in the provider of a value,
hence do so.
Lennart Poettering [Tue, 8 Feb 2022 10:25:07 +0000 (11:25 +0100)]
sd-boot: don't export ticks_read() and ticks_freq()
They only have a single user in time_usec(), hence don't expose them.
Lennart Poettering [Tue, 8 Feb 2022 10:23:19 +0000 (11:23 +0100)]
sd-boot: add overflow check to TSC reads
On some archs the counter is 32bit, and in case of virtualization it
might actually overflow, who knows.
Lennart Poettering [Tue, 8 Feb 2022 10:18:44 +0000 (11:18 +0100)]
sd-boot: split out TSC/time API
These are a whole family of functions, let's give them their own .c/.h
file.
No code changes, just splitting things out.
Lennart Poettering [Thu, 3 Feb 2022 11:06:54 +0000 (12:06 +0100)]
Revert "boot-timestamps: Discard firmware init time when running in a VM"
This reverts commit
f699bd81e8e18da2d2fc11e7fb7dce95f8bb3f9e (#22063)
We should suppress the TSC data when we generate it if we assume its
invalid, not when we consume it, because at that point we don't even
know if the data stems from TSC or something else.
adrian5 [Tue, 8 Feb 2022 11:42:19 +0000 (12:42 +0100)]
docs: Improve HOME_DIRECTORY.md
Luca Boccassi [Tue, 8 Feb 2022 12:01:14 +0000 (12:01 +0000)]
Merge pull request #22430 from yuwata/resolve-fix-memleak-and-use-after-free
resolve: fix memleak and use-after-free, and several cleanups
Lennart Poettering [Tue, 8 Feb 2022 10:54:37 +0000 (11:54 +0100)]
man: coredump.conf: document defaults limits
Lennart Poettering [Tue, 8 Feb 2022 10:52:17 +0000 (11:52 +0100)]
coredump: raise the coredump save size on 64bit systems to 32G (and lower it to 1G on 32bit systems)
Apparently 2G is too low for various real-life systems. But raising it
universally above 2^32 sounds wrong to me, since that makes no sense on
32bit systems, that we still support.
Hence, let's raise the limit to 32G on 64bit systems, and *lower* it to
1G on 32bit systems.
32G is 4 orders of magnitude higher then the old settings. Let's hope
that's enough for now. Should this not be enough we can raise it
further.
Fixes: #22076
Lennart Poettering [Tue, 8 Feb 2022 10:45:00 +0000 (11:45 +0100)]
README: CONFIG_KCMP is the new kernel compile time option for kcmp()
Fixes: #21947
Lennart Poettering [Mon, 7 Feb 2022 13:35:40 +0000 (14:35 +0100)]
tests: add repart tests for block devices with 1024, 2048, 4096 byte sector sizes
let's make sure repart works with 4K drives and exotic sector sizes.
Lennart Poettering [Fri, 4 Feb 2022 16:39:44 +0000 (17:39 +0100)]
repart: fix sector size handling
This queries the sector size from libfdisk instead of assuming 512, and
uses that when converting from bytes to the offset/size values libfdisk
expects.
This is an alternative to Tom Yan's #21823, but prefers using libfdisk's
own ideas of the sector size instead of going directly to the backing
device via ioctls. (libfdisk can after all also operate on regular
files, where the sector size concept doesn't necessarily apply the same
way.)
This also makes the "grain" variable, i.e. how we'll align the
partitions. Previously this was hardcoded to 4K, and that still will be
the minimum grain we use, but should the sector size be larger than that
we'll use the next multiple of the sector size instead.
Yu Watanabe [Sat, 5 Feb 2022 13:31:06 +0000 (22:31 +0900)]
resolve: reuse timer event source for DnsQuery
If the query get CNAME or DNAME, then the query will be restarted.
Even in that case, previously, the event source was freed and allocated
again. Let's slightly optimize it.
Yu Watanabe [Sat, 5 Feb 2022 13:04:42 +0000 (22:04 +0900)]
resolve: use _cleanup_ attribute for freeing DnsQuery
Yu Watanabe [Sat, 5 Feb 2022 13:03:19 +0000 (22:03 +0900)]
resolve: fix possible memleak
Fortunately, unlike the issue fixed in the previous commit, the memleak
should be superficial and not become apparent, as the queries handled
here are managed by the stub stream, and will be freed when the stream
is closed.
Just for safety, and slightly reducing the runtime memory usage by the
stub stream.
Yu Watanabe [Sat, 5 Feb 2022 12:37:01 +0000 (21:37 +0900)]
resolve: fix potential memleak and use-after-free
When stub stream is closed early, then queries associated to the stream
are freed. Previously, the timer event source for queries may not be
disabled, hence may be triggered with already freed query.
See also dns_stub_stream_complete().
Note that we usually not set NULL or zero when freeing simple objects.
But, here DnsQuery is large and complicated object, and the element may
be referenced in subsequent freeing process in the future. Hence, for
safety, let's set NULL to the pointer.
Matt Walton [Fri, 4 Feb 2022 17:47:08 +0000 (11:47 -0600)]
hwbd: 60-sensor.hwdb: Add Pipo W2Pro
Add accelerometer matrix for Pipo W2Pro tablet. Y-axis was backwards (normal <--> bottom-up).
Benjamin Berg [Mon, 7 Feb 2022 16:34:21 +0000 (17:34 +0100)]
oom: Cleanup of information dump code after kill
This is a follow up to
29f4185a9cdc ("oomd: Dump top offenders after a
kill action") to clean up the code a bit for review comments that
happened after the code had been merged already.
Lennart Poettering [Mon, 7 Feb 2022 09:59:05 +0000 (10:59 +0100)]
watchdog: work around Coverity confusion
Coverity (and I, initially) get really confused about "fn"'s validity
here. it doesn't grok that free_and_strdup() is actually a NOP in case
the string isn't changed, and assumes it always invalidates the
specified buffer, which it doesn't do though.
Follow-up for:
f4b1a6b6419b771d26342a9b75b1d77ee9d90133
Daan De Meyer [Mon, 7 Feb 2022 20:19:29 +0000 (20:19 +0000)]
journal: Improve handling of corruption during upwards entry iteration
If we're going upwards in the journal file during entry iteration and we
can't reach the current entry due to corruption, start iterating upwards
from the last reachable entry array. This is equivalent to skipping
all entries in the array that can't be reached anymore.
Fixes #22431
Daan De Meyer [Mon, 7 Feb 2022 20:15:07 +0000 (20:15 +0000)]
journal: Fix upwards iteration of entry items in case of corruption
8d801e35cb155faa08235a5af8b4d6ad60715837 didn't take into account
upwards iteration of entry items when we're working on a corrupted
journal file. Instead of moving to the previous entry array, we'd
always move to the next array, regardless of the iteration direction.
To fix this, we introduce bump_entry_array() that moves to the next
or previous entry array depending on the given direction. Since the
entry array chains are singly linked lists, we have to start iterating
from the front to find the previous array. We only reach this logic
if we're working on a corrupted journal file so being slow here shouldn't
matter too much.
Luca Boccassi [Mon, 7 Feb 2022 18:06:24 +0000 (18:06 +0000)]
Merge pull request #22383 from yuwata/network-generator-keep-configuration
network: enable KeepConfiguration= when running on network filesystem
Michael Biebl [Mon, 7 Feb 2022 16:49:26 +0000 (17:49 +0100)]
login: typo fix
Michael Biebl [Mon, 7 Feb 2022 13:57:00 +0000 (14:57 +0100)]
man: fix typo
bearhoney [Mon, 7 Feb 2022 10:41:41 +0000 (11:41 +0100)]
Update CODING_STYLE.md
Fixed typo.
Evgeny Vereshchagin [Fri, 4 Feb 2022 15:17:25 +0000 (15:17 +0000)]
tests: also fuzz packets sent in the DHCP6_STATE_SOLICITATION state
With aborts enabled the fuzzer can catch issues like
https://github.com/systemd/systemd/commit/
26a63b81322a3bd8b9fbd43f75897c391708de2c
Let's extend it a bit to let it cover issues like
https://github.com/systemd/systemd/pull/22406#discussion_r798932098
Thomas Haller [Thu, 3 Feb 2022 17:55:18 +0000 (18:55 +0100)]
sd-dhcp6-client: fix sending prefix delegation request during rebind
Fixes an assertion failure "pd->type == SD_DHCP6_OPTION_IA_PD" in dhcp6_option_append_pd().
Something similar was done in commit
26a63b81322a ('sd-dhcp6-client: Fix
sending prefix delegation request (#17136)'). The justification is
probably the same.
Yu Watanabe [Fri, 4 Feb 2022 06:33:38 +0000 (15:33 +0900)]
network: enable KeepConfiguration= when running on network filesystem
Also, set KeepConfiguration=dhcp-on-stop by default when running in
initrd.
Fixes #21967.
Yu Watanabe [Sat, 5 Feb 2022 00:26:40 +0000 (09:26 +0900)]
Merge pull request #22416 from fbuihuu/misc
Misc
Anita Zhang [Fri, 4 Feb 2022 22:44:04 +0000 (14:44 -0800)]
Merge pull request #22395 from benzea/benzea/oomd-dump-offenders
oomd: Dump top offenders after a kill action
Benjamin Berg [Thu, 3 Feb 2022 14:50:31 +0000 (15:50 +0100)]
oomd: Dump top offenders after a kill action
This hopefully makes it more transparent why a specific cgroup was
killed by systemd-oomd.
Lennart Poettering [Thu, 3 Feb 2022 14:57:00 +0000 (15:57 +0100)]
man: systemd-stdio-bridge doesn't connect "two busses"
In D-Bus, clients connect to a bus (the usual case), or use direct
questions to each other (the unusual case). A bus is a program one can
connect to and implemented by dbus-daemon or dbus-broker. HOwever,
busses never connect between each other, that doesn't exist. Hence don't
claim so.
This is probably confusion about the fact that sd-bus calls D-Bus
connection objects just "sd_bus" for simplicity, given they are used in
99% of the cases to connect to a bus — only in exceptional cases they
are used for direct connections between peers without involving a bus.
Follow-up for
b7bb58ef70b0c876941a1c31ed4e2f5f1dc5ed0e
Lennart Poettering [Wed, 2 Feb 2022 09:42:37 +0000 (10:42 +0100)]
journal-file: explicitly handle file systems that do not support hole punching
Apparently the error code fallocate() returns if hole punching is not
supported is not too well defined (man page just says "an error is
returned"), hence let's accept the usual set of errors, and the
normalize it to EOPNOTSUPP, and generate a clear error message in this
case.
Lennart Poettering [Wed, 2 Feb 2022 09:42:10 +0000 (10:42 +0100)]
journal-file: fix error handling of pread() in journald_file_punch_holes()
Lennart Poettering [Fri, 4 Feb 2022 15:29:09 +0000 (16:29 +0100)]
Merge pull request #22378 from bluca/on_fail_follow_ups
Follow-ups for #20833
Lennart Poettering [Fri, 4 Feb 2022 15:28:41 +0000 (16:28 +0100)]
Merge pull request #22375 from michaelolbrich/watchdog
fix watchdog handling during reboot
Ruben Kerkhof [Fri, 4 Feb 2022 15:07:12 +0000 (16:07 +0100)]
systemd.netdev(5): fix acronym for DOVE extensions
Michael Olbrich [Wed, 2 Feb 2022 14:33:07 +0000 (15:33 +0100)]
shutdown: don't stop the watchdog
This basically reverts #22079.
Stopping the watchdog is wrong. The reboot watchdog is supposed to cover
the whole time from the point when systemd start systemd-reboot until the
hardware resets.
Otherwise the system may hang in the final shutdown phase.
Add a comment, why keeping the watchdog running is correct here.
Michael Olbrich [Wed, 2 Feb 2022 14:26:53 +0000 (15:26 +0100)]
watchdog: fix watchdog_set_device() when the default watchdog device is used
If watchdog_set_device() is not called before open_watchdog() then
'watchdog_device' remains 'NULL' while the device is open.
As a result, the "same device" check in watchdog_set_device() does not work
correctly: If no device is specified (e.g. from watchdog_free_device())
then the current fd is not closed.
Fix this by setting 'watchdog_device' to the correct device during
open_watchdog()
Franck Bui [Thu, 27 Jan 2022 18:13:24 +0000 (19:13 +0100)]
udev/net_id: show the correct identifier in the debug output of dev_pci_onboard()
Franck Bui [Tue, 18 Jan 2022 14:14:12 +0000 (15:14 +0100)]
core: make use of VALID_CHARS_WITH_AT in unit_name_is_valid()
Yu Watanabe [Fri, 4 Feb 2022 06:22:20 +0000 (15:22 +0900)]
stat-util: introduce path_is_network_fs()
Yu Watanabe [Thu, 3 Feb 2022 03:14:19 +0000 (12:14 +0900)]
network-generator: rename DHCP_TYPE_DHCP -> DHCP_TYPE_DHCP4
To emphasize this is DHCPv4. No behavior is changed.
Davide Cavalca [Thu, 3 Feb 2022 16:35:35 +0000 (08:35 -0800)]
hwdb: add HP calculators
Lennart Poettering [Thu, 3 Feb 2022 16:19:32 +0000 (17:19 +0100)]
hostnamed: trivial optimization
Luca Boccassi [Thu, 3 Feb 2022 17:43:45 +0000 (17:43 +0000)]
portable: reopen socket with O_RDONLY
Follow-up for
e3f7ed944ae750a40685c52349f3cc850db0876e