Yu Watanabe [Fri, 1 Oct 2021 07:44:25 +0000 (16:44 +0900)]
network: move address generation methods to network-address-generation.[ch]
Yu Watanabe [Fri, 1 Oct 2021 08:42:31 +0000 (17:42 +0900)]
in-addr-util: introduce in{4,6}_addr_prefix_covers()
Yu Watanabe [Fri, 1 Oct 2021 08:35:04 +0000 (17:35 +0900)]
in-addr-util: do not shift 8 or more for uint8_t
See ISO/IEC 9899:TC3 § 6.5.7.3.
Yu Watanabe [Fri, 17 Sep 2021 12:38:00 +0000 (21:38 +0900)]
in-addr-util: introduce in{4,6}_addr_mask()
Yu Watanabe [Fri, 17 Sep 2021 12:11:50 +0000 (21:11 +0900)]
in-addr-util: introduce in6_addr_hash_ops_free
Yu Watanabe [Fri, 17 Sep 2021 11:54:47 +0000 (20:54 +0900)]
network: radv: reorder functions
In other files, we usually (but not always) place functions in the following order:
- network_adjust_xxx(), which applies default or updates settings
specified in .network files,
- link_xxx_enabled(), which checks if the functionality is enabled,
- xxx_new() and xxx_free(), allocator and deallocator for sections,
- functions which apply/update/remove configs
- validators of section,
- conf parsers.
This does not change each function, but just changes the order.
Lennart Poettering [Wed, 6 Oct 2021 14:23:27 +0000 (16:23 +0200)]
Merge pull request #18145 from kinvolk/iaguis/lsm-bpf
Add RestrictFileSystems= property using LSM BPF
Lennart Poettering [Tue, 5 Oct 2021 16:24:05 +0000 (18:24 +0200)]
user-record: disable two pbkdf fields that don't apply for pkbdf2
Fixes: #20830
chlorophyll-zz [Tue, 5 Oct 2021 03:24:20 +0000 (05:24 +0200)]
Update 60-sensor.hwdb
#20287 was wrong.
Y Axis was only reversed on Arch Linux because of a problem with iio-sensor-proxy
This restores before the patch.
Zbigniew Jędrzejewski-Szmek [Sun, 3 Oct 2021 08:49:40 +0000 (10:49 +0200)]
man: add discussion of read-only filesystem support in daemons
This is inspired by https://bugzilla.redhat.com/show_bug.cgi?id=
1853293. Let's
mention that applications should be prepared for /var being read-only.
Iago López Galeiras [Mon, 8 Feb 2021 14:10:13 +0000 (15:10 +0100)]
man: document systemd-analyze filesystems
Iago López Galeiras [Mon, 8 Feb 2021 14:07:19 +0000 (15:07 +0100)]
analyze: add filesystems command
Iago López Galeiras [Tue, 22 Dec 2020 19:27:50 +0000 (20:27 +0100)]
README: document LSM BPF requirements
Iago López Galeiras [Fri, 11 Dec 2020 16:32:54 +0000 (17:32 +0100)]
test: add test-bpf-lsm
Iago López Galeiras [Mon, 8 Feb 2021 14:06:29 +0000 (15:06 +0100)]
man: document EXIT_BPF status
Iago López Galeiras [Mon, 8 Feb 2021 14:06:22 +0000 (15:06 +0100)]
man: add RestrictFileSystems= documentation
Iago López Galeiras [Fri, 11 Dec 2020 12:03:54 +0000 (13:03 +0100)]
mkosi: add libbpf dependency
For distros that ship libbpf >=0.2.0.
Iago López Galeiras [Fri, 11 Dec 2020 12:20:23 +0000 (13:20 +0100)]
core: add dbus RestrictFileSystems= properties
Iago López Galeiras [Thu, 11 Feb 2021 15:59:30 +0000 (16:59 +0100)]
core: add RestrictFileSystems= fragment parser
It takes an allow or deny list of filesystems services should have
access to.
Iago Lopez Galeiras [Tue, 5 Oct 2021 11:18:49 +0000 (13:18 +0200)]
core: use LSM BPF functions to implement RestrictFileSystems=
It attaches the LSM BPF program when the system manager starts up.
It populates the hash of maps BPF map when services that have
RestrictFileSystems= set start.
It cleans up the hash of maps when the unit cgroup is pruned.
To pass the file descriptor of the BPF map we add it to the keep_fds
array.
Iago Lopez Galeiras [Tue, 13 Jul 2021 07:51:06 +0000 (09:51 +0200)]
core: add BPF LSM functions
This adds 6 functions to implement RestrictFileSystems=
* lsm_bpf_supported() checks if LSM BPF is supported. It checks that
cgroupv2 is used, that BPF LSM is enabled, and tries to load the BPF
LSM program which makes sure BTF and hash of maps are supported, and
BPF LSM programs can be loaded.
* lsm_bpf_setup() loads and attaches the LSM BPF program.
* lsm_bpf_unit_restrict_filesystems() populates the hash of maps BPF map with the
cgroupID and the set of allowed or denied filesystems.
* lsm_bpf_cleanup() removes a cgroupID entry from the hash of maps.
* lsm_bpf_map_restrict_fs_fd() is a helper function to get the file
descriptor of the BPF map.
* lsm_bpf_destroy() is a wrapper around the destroy function of the BPF
skeleton file.
Iago López Galeiras [Mon, 12 Jul 2021 10:18:31 +0000 (12:18 +0200)]
shared/bpf-dlopen: expose more libbpf functions
They're needed for the LSM BPF feature.
Iago López Galeiras [Fri, 11 Dec 2020 12:24:13 +0000 (13:24 +0100)]
exit-status: add EXIT_BPF
It will be used later.
Iago López Galeiras [Fri, 11 Dec 2020 12:15:25 +0000 (13:15 +0100)]
cgroup-util: add cg_path_get_cgroupid()
It returns the cgroupID from a cgroup path.
Iago López Galeiras [Fri, 11 Dec 2020 11:40:33 +0000 (12:40 +0100)]
bpf: add restrict_fs BPF program
It hooks into the file_open LSM hook and allows only when the filesystem
where the open will take place is present in a BPF map for a particular
cgroup.
The BPF map used is a hash of maps with the following structure:
cgroupID -> (s_magic -> uint32)
The inner map is effectively a set.
The entry at key 0 in the inner map encodes whether the program behaves
as an allow list or a deny list: if its value is 0 it is a deny list,
otherwise it is an allow list.
When the cgroupID is present in the map, the program checks the inner
map for the magic number of the filesystem associated with the file
that's being opened. When the program behaves as an allow list, if that
magic number is present it allows the open to succeed, when the program
behaves as a deny list, it only allows access if the that magic number
is NOT present. When access is denied the program returns -EPERM.
The BPF program uses CO-RE (Compile-Once Run-Everywhere) to access
internal kernel structures without needing kernel headers present at
runtime.
Iago López Galeiras [Mon, 8 Feb 2021 14:14:20 +0000 (15:14 +0100)]
basic: use filesystem database
Iago López Galeiras [Mon, 8 Feb 2021 18:54:24 +0000 (19:54 +0100)]
basic: add filesystem database
Stores filesystem_name -> magic_number(s).
Iago López Galeiras [Mon, 8 Feb 2021 17:32:22 +0000 (18:32 +0100)]
missing_magic: add several filesystems
They were failing on CI.
Iago Lopez Galeiras [Thu, 19 Aug 2021 09:26:49 +0000 (11:26 +0200)]
basic: move CIFS magic number to missing_magic.h
It fits better there.
Lennart Poettering [Wed, 29 Sep 2021 13:21:38 +0000 (15:21 +0200)]
unit-file: tighten unit file discovery checks
Only accept DT_REG/DT_LNK/DT_DIR entries, ignore all others.
Only accpet DT_REG/DT_LNK for file names that are valid unit file names.
Only accept DT_DIR for filenames that are valid unit file names which
are suffixed by .d, .wants, .requires
This doesn't really fix any bugs, but tightens what we insert into the
lookup tables.
Yu Watanabe [Wed, 6 Oct 2021 03:27:27 +0000 (12:27 +0900)]
Merge pull request #20937 from poettering/sync-split
split up a few files in src/basic/
Andrew Soutar [Wed, 6 Oct 2021 02:55:27 +0000 (22:55 -0400)]
basic/env-util: correctly parse extended vars after non-extended vars (#20941)
Lennart Poettering [Tue, 5 Oct 2021 12:10:27 +0000 (14:10 +0200)]
repart: use right error variable
Lennart Poettering [Tue, 5 Oct 2021 13:23:29 +0000 (15:23 +0200)]
basic: move chase_symlinks_and_fopen_unlocked() → chase-symlinks.[ch]
Lennart Poettering [Tue, 5 Oct 2021 13:12:27 +0000 (15:12 +0200)]
basic: spit out chase_symlinks() from fs-util.[ch] → chase-symlinks.[ch]
Lennart Poettering [Tue, 5 Oct 2021 12:44:17 +0000 (14:44 +0200)]
basic: split out inotify-related calls from fs-util.h → inotify-util.h
Lennart Poettering [Tue, 5 Oct 2021 12:21:57 +0000 (14:21 +0200)]
basic: split out glyph/emoji related calls from locale-util.[ch] into glyph-util.[ch]
These functions are used pretty much independently of locale, i.e. the
only info relevant is whether th locale is UTF-8 or not. Hence let's
give this its own pair of .c/.h files.
Lennart Poettering [Tue, 5 Oct 2021 12:03:26 +0000 (14:03 +0200)]
basic: split out sync() family of calls from fs-util.[ch] into new c/h file
No changes in code, just some splitting out.
Luca Boccassi [Tue, 5 Oct 2021 08:54:24 +0000 (09:54 +0100)]
Merge pull request #20893 from poettering/per-user-oom-score
default to higher oom scores for user sessions
Anita Zhang [Tue, 5 Oct 2021 01:40:59 +0000 (18:40 -0700)]
Merge pull request #20892 from yuwata/test-network-preferred-lifetime-zero
network: drop and warn duplicated address settings
Luca Boccassi [Sun, 3 Oct 2021 15:50:38 +0000 (16:50 +0100)]
test: create and merge code coverage reports in integration tests
If -Db_coverage=true is used at build time, then ARTIFACT_DIRECTORY/TEST-XX-FOO.coverage-info
files are created with code coverage data, and run-integration-test.sh also
merges them into ARTIFACT_DIRECTORY/merged.coverage-info since the coveralls.io
helpers accept only a single file.
Lennart Poettering [Thu, 30 Sep 2021 09:32:43 +0000 (11:32 +0200)]
man: document the new DefaultOOMScoreAdjust= setting
Lennart Poettering [Thu, 30 Sep 2021 09:23:32 +0000 (11:23 +0200)]
units: run user service managers at OOM score adjustment 100
Let's make it slightly more likely that a per-user service manager is
killed than any system service. We use a conservative 100 (from a range
that goes all the way to 1000).
Replaces: #17426
Together with the previous commit this means: system manager and system
services are placed at OOM score adjustment 0 (specifically: they
inherit kernel default of 0). User service manager (both for root and
non-root) are placed at 100. User services for non-root are placed at
200, those for root inherit 100.
Note that processes forked off the user *sessions* (i.e. not forked off
the per-user service manager) remain at 0 (e.g. the shell process
created by a tty or ssh login). This probably should be
addressed too one day (maybe in pam_systemd?), but is not covered here.
Lennart Poettering [Thu, 30 Sep 2021 09:21:18 +0000 (11:21 +0200)]
core: add a new setting DefaultOOMScoreAdjust= and set it to 100 above service manager's by default
Let's make our service managers slightly less likely to be killed by the
OOM killer by adjusting our services' OOM score adjustment to 100 above
ours. Do this conservatively, i.e. only for regular user sessions.
Lennart Poettering [Thu, 30 Sep 2021 09:19:34 +0000 (11:19 +0200)]
test: add test case for {get,set}_oom_score_adjust()
Lennart Poettering [Thu, 30 Sep 2021 09:19:11 +0000 (11:19 +0200)]
process-util: add helper for querying oom score adjustment value
Yu Watanabe [Thu, 30 Sep 2021 10:22:22 +0000 (19:22 +0900)]
test-network: add tests for duplicated address setting
Also, add more tests for PreferredLifetime=0
C.f. #20891.
Yu Watanabe [Mon, 4 Oct 2021 09:26:24 +0000 (18:26 +0900)]
network: do not ignore critical errors like OOM
Yu Watanabe [Mon, 4 Oct 2021 09:22:49 +0000 (18:22 +0900)]
network: downgrade log level for non-critical errors
Yu Watanabe [Fri, 1 Oct 2021 00:22:18 +0000 (09:22 +0900)]
network: drop and warn duplicated Address= settings
Fixes #20891.
Luca Boccassi [Sat, 2 Oct 2021 10:48:13 +0000 (11:48 +0100)]
man/glib-event-glue example: relicense to CC0-1.0
All other examples were relicensed to CC0-1.0 since they are intended
to be copied and pasted anywhere without any restrictions.
Relicense the last one too.
Yu Watanabe [Fri, 1 Oct 2021 00:09:48 +0000 (09:09 +0900)]
network: rename address_hash_ops -> address_hash_ops_free
Preparation for later commits.
Yu Watanabe [Fri, 1 Oct 2021 00:03:18 +0000 (09:03 +0900)]
network: make several hash_ops static
Yu Watanabe [Fri, 1 Oct 2021 00:41:02 +0000 (09:41 +0900)]
network: address: fix flags and lifetime in debugging logs
Prompted by #20891.
Egor [Sun, 3 Oct 2021 00:42:50 +0000 (03:42 +0300)]
sleep: don't skip resume device with low priority/available space
this fixes hibernation when there's a higher priority swap preceding
the resume swap in /proc/swaps.
fixes #19486
Frantisek Sumsal [Sun, 3 Oct 2021 16:08:50 +0000 (16:08 +0000)]
Merge pull request #20924 from weblate/weblate-systemd-master
Translations update from Weblate
Slimane Selyan Amiri [Sun, 3 Oct 2021 16:05:00 +0000 (18:05 +0200)]
po: Translated using Weblate (Kabyle)
Currently translated at 2.1% (4 of 189 strings)
Co-authored-by: Slimane Selyan Amiri <selyan.kab@gmail.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/kab/
Translation: systemd/main
Gogo Gogsi [Sun, 3 Oct 2021 16:05:00 +0000 (18:05 +0200)]
po: Translated using Weblate (Croatian)
Currently translated at 100.0% (189 of 189 strings)
Co-authored-by: Gogo Gogsi <linux.hr@protonmail.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/hr/
Translation: systemd/main
Luca Boccassi [Fri, 1 Oct 2021 21:57:11 +0000 (22:57 +0100)]
Merge pull request #20886 from bluca/license
SPDX: add README and license texts
Weblate [Fri, 1 Oct 2021 16:26:17 +0000 (18:26 +0200)]
po: Update translation files
Updated by "Update PO files to match POT (msgmerge)" hook in Weblate.
Co-authored-by: Weblate <noreply@weblate.org>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/
Translation: systemd/main
Luca Boccassi [Wed, 29 Sep 2021 21:10:34 +0000 (22:10 +0100)]
Add all other applicable licenses under LICENSES/
License texts copied from:
https://github.com/spdx/license-list-data/blob/master/text/
Luca Boccassi [Wed, 29 Sep 2021 17:42:57 +0000 (18:42 +0100)]
add LICENSES/README.md explaining the license situation
Luca Boccassi [Fri, 1 Oct 2021 10:44:33 +0000 (11:44 +0100)]
man: add licenses to all files that lack one
Documentation is licensed under LGPL-2.1-or-later.
Scripts are MIT to facilitate reuse.
Examples are relicensed to CC0-1.0 to maximise copy-and-paste
for users, with permission from authors.
Luca Boccassi [Wed, 29 Sep 2021 17:16:09 +0000 (18:16 +0100)]
tree-wide: fix SPDX short identifier for LGPL-2.1-or-later
https://spdx.dev/ids/#:~:text=Allowing%20later%20versions%20of%20a%20license
https://spdx.org/licenses/LGPL-2.1-or-later.html
Luca Boccassi [Fri, 1 Oct 2021 16:26:08 +0000 (17:26 +0100)]
Merge pull request #20907 from keszybz/licensing-cleanup
Licensing cleanup
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 11:05:51 +0000 (13:05 +0200)]
xorg/50-systemd-user: add a full license header
This file is installed onto user systems, so it should have the full
header that says where it came from.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 11:04:32 +0000 (13:04 +0200)]
licensing: add forgotten spdx headers
Those are all "our" files, but we forgot to add the headers,
most likely because of non-standard file extensions.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:54:06 +0000 (12:54 +0200)]
licensing: add missing header to one .network file
It should have the full header because it will be installed onto
user systems like the other .network files.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:49:36 +0000 (12:49 +0200)]
licensing: add spdx header to chromiumos helper, move license file
It makes it easier to process the license automatically like other files.
The text of the license in tools/chromiumos/LICENSE matches
https://spdx.org/licenses/BSD-3-Clause.html exactly.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:28:36 +0000 (12:28 +0200)]
licensing: add spdx to our .cocci files
Since those are chunks of code based on our codebase, it's easiest to use the
same license.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:21:09 +0000 (12:21 +0200)]
licensing: add header to POTFILES.in
This is just a stupid file list, but without the header the file shows
up on the list of files without a header. I checked that 'systemd-update-po'
still works, so I think it's OK to add this.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:19:43 +0000 (12:19 +0200)]
licensing: add missing license headers on translation files
Also make the headers more alike for consistency.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:10:22 +0000 (12:10 +0200)]
ci: use LGPLv2+ for all our ci configuration
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:09:20 +0000 (12:09 +0200)]
github: use the same headers on yaml files
Also adjust the mention of location of mkosi files,
follow-up for
d55ad7fe96eb1edf438a7a41a465723bd29d4b10.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 10:02:07 +0000 (12:02 +0200)]
licensing: say that our github docs are LGPLv2.1+
This mirros what
0aff7b7584 did for docs/.
Franck Bui [Thu, 30 Sep 2021 12:05:36 +0000 (14:05 +0200)]
mount-util: fix fd_is_mount_point() when both the parent and directory are network fs
The second call to name_to_handle_at_loop() didn't check for the specific
errors that can happen when the parent dir is mounted by nfs and instead of
falling back like it's done for the child dir, fd_is_mount_point() failed in
this case.
Zbigniew Jędrzejewski-Szmek [Fri, 1 Oct 2021 08:51:48 +0000 (10:51 +0200)]
Merge pull request #20894 from andir/editorconfig
Set maximum line length in editorconfig for C and XML files
Lukas Senionis [Thu, 30 Sep 2021 18:31:26 +0000 (21:31 +0300)]
reduce the fuzz values in evdev hwdb for Asus UX362FA
Yu Watanabe [Fri, 1 Oct 2021 06:12:55 +0000 (15:12 +0900)]
Merge pull request #20777 from benzea/benzea/fix-seccomp-filter
seccomp: Always install filters for native architecture
Michael Biebl [Thu, 30 Sep 2021 23:00:28 +0000 (01:00 +0200)]
networkd-test: fix resolved_domain_restricted_dns
megasearch.net was meant to be a non-existing bogus domain, and had been
for a long time. But it seems some domain grabber recently registered
it, and it's an actual thing now:
$ host megasearch.net
megasearch.net has address 207.148.248.143
This causes the test to fail randomly.
Use search.example.com instead which yields
$ host search.example.com
Host search.example.com not found: 3(NXDOMAIN)
Fixes: #18357
Luca Boccassi [Thu, 30 Sep 2021 19:53:00 +0000 (20:53 +0100)]
Merge pull request #20884 from mrc0mmand/to-shellcheck-or-not-to-shellcheck
tree-wide: the last batch of shellcheck shenanigans
Frantisek Sumsal [Thu, 30 Sep 2021 12:14:19 +0000 (14:14 +0200)]
test: use a less restrictive portable profile when running w/ sanitizers
Since
f833df3 we now actually use the seccomp rules defined in portable
profiles. However, the default one is too restrictive for sanitizers, as
it blocks certain syscall required by LSan. Mitigate this by using the
'trusted' profile when running TEST-29-PORTABLE under sanitizers.
Andreas Rammhold [Thu, 30 Sep 2021 11:44:26 +0000 (13:44 +0200)]
editorconfig: set maximum line length to 109 for man/*.xml files
Andreas Rammhold [Thu, 30 Sep 2021 11:40:51 +0000 (13:40 +0200)]
editorconfig: enforce maximum line length in .c and .h files
Frantisek Sumsal [Wed, 29 Sep 2021 20:08:51 +0000 (22:08 +0200)]
ci: introduce Super-Linter for shell scripts
See: https://github.com/marketplace/actions/super-linter
Frantisek Sumsal [Wed, 29 Sep 2021 19:28:55 +0000 (21:28 +0200)]
tools: shellcheck-ify tool scripts
Frantisek Sumsal [Wed, 29 Sep 2021 18:30:08 +0000 (20:30 +0200)]
test: shellcheck-ify test scripts
Frantisek Sumsal [Thu, 30 Sep 2021 10:11:27 +0000 (12:11 +0200)]
test: drop an unused file
Benjamin Berg [Fri, 24 Sep 2021 11:35:34 +0000 (13:35 +0200)]
test: Add failing/non-failing syscall filter test setting architecture
This adds a high level test verifying that syscall filtering in
combination with a simple architecture filter for the "native"
architecture works fine.
Benjamin Berg [Fri, 17 Sep 2021 12:00:39 +0000 (14:00 +0200)]
test: Check that "native" architecture is always filtered
Benjamin Berg [Fri, 17 Sep 2021 11:05:32 +0000 (13:05 +0200)]
seccomp: Always install filters for native architecture
The commit
6597686865ff ("seccomp: don't install filters for archs that
can't use syscalls") introduced a regression where filters may not be
installed for the "native" architecture. This means that setting
SystemCallArchitectures=native for a unit effectively disables the
SystemCallFilter= and SystemCallLog= options.
Conceptually, we have two filter stages:
1. architecture used for syscall (SystemCallArchitectures=)
2. syscall + architecture combination (SystemCallFilter=)
The above commit tried to optimize the filter generation by skipping the
second level filtering when it is not required.
However, systemd will never fully block the "native" architecture using
the first level filter. This makes the code a lot simpler, as systemd
can execve() the target binary using its own architecture. And, it
should be perfectly fine as the "native" architecture will always be the
one with the most restrictive seccomp filtering.
Said differently, the bug arises because (on x86_64):
1. x86_64 is permitted by libseccomp already
2. native != x86_64
3. the loop wants to block x86_64 because the permitted set only
contains "native" (i.e. "native" != "x86_64")
4. x86_64 is marked as blocked in seccomp_local_archs
Thereby we have an inconsistency, where it is marked as blocked in the
seccomp_local_archs array but it is allowed by libseccomp. i.e. we will
skip generating filter stage 2 without having stage 1 in place.
The fix is simple, we just skip the native architecture when looping
seccomp_local_archs. This way the inconsistency cannot happen.
alexlzhu [Wed, 29 Sep 2021 20:41:23 +0000 (13:41 -0700)]
docs: Fixing typo in systemd.device man page and README.
systemd-udevd.service listens to kernel uevents and is needed for device
units to be available.
systemd-udevd.service is misspelled as systemd-udev.service in a couple places.
Fixing typo.
Frantisek Sumsal [Wed, 29 Sep 2021 17:55:24 +0000 (19:55 +0200)]
ci: shellcheck-ify CI scripts
Yu Watanabe [Wed, 29 Sep 2021 19:01:57 +0000 (04:01 +0900)]
Merge pull request #20876 from poettering/openssl3-creds
creds-util: switch to OpenSSL 3.0 APIs
Luca Boccassi [Wed, 29 Sep 2021 17:05:28 +0000 (18:05 +0100)]
Merge pull request #20883 from bluca/bpf_header_license
headers: update bpf_insn.h to dual license
Lennart Poettering [Wed, 29 Sep 2021 16:53:22 +0000 (18:53 +0200)]
Merge pull request #20219 from khfeng/use-intel-hid-rfkill
hwdb: Remove intel-hid rfkill mask
Luca Boccassi [Wed, 29 Sep 2021 16:42:51 +0000 (17:42 +0100)]
docs: mention that contributed code must be compatible with GPL-2.0-or-later explicitly
Luca Boccassi [Wed, 29 Sep 2021 16:40:52 +0000 (17:40 +0100)]
headers: update bpf_insn.h to dual license
This header is copied from the kernel. It was relicensed from GPL-2.0-only
to GPL-2.0-only OR BSD-2-Clause, so update our SPDX tag accordingly.
For more details and ACKS from all copyright holders authorizing the
license change see:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=
d75fe9cb1dd062684c9fb8a4581738170365dc06
Yu Watanabe [Sun, 29 Aug 2021 12:20:43 +0000 (21:20 +0900)]
core/mount: add implicit unit dependencies even if when mount unit is generated from /proc/self/mountinfo
Hopefully fixes #20566.
Yu Watanabe [Wed, 29 Sep 2021 15:08:16 +0000 (00:08 +0900)]
Merge pull request #20824 from yuwata/sd-dhcp6-client-cleanups
sd-dhcp6-client: several cleanups for parsing options