summaryrefslogtreecommitdiffstats
path: root/docs (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-08-30tree-wide: Mark some constants as unsignedJan Janssen6-11/+11
All these are really unsigned and used as such. This silences some -Wformat-signedness warnings with gcc.
2022-08-30journal: Show grcrypt error message instead of a raw codeJan Janssen1-2/+2
2022-08-30efivars: Parse into unsignedJan Janssen1-1/+2
The format specifiers for UUID parsing use %x, which expects unsigned.
2022-08-30tree-wide: Use correct format specifiersJan Janssen55-102/+102
gcc will complain about all these with -Wformat-signedness.
2022-08-29hwdb: Force release calculator key on all HP Victus laptopsLockBlock-dev1-0/+4
The key doesn't create a release event. This is a fix to make it work properly. I made sure the product is generic to work on all Victus laptops. This fix #23006.
2022-08-29homed: don't use stat() data from an unrelated inodeLennart Poettering1-1/+1
This doesn't really change anything, since we know the stat data used here also contains S_IFBLK, but it's frickin' confusing.
2022-08-29strv: modernize strv_fnmatch() a bitLennart Poettering2-8/+21
2022-08-29loopback: use ERRNO_IS_PRIVILEGE() where appropriateLennart Poettering1-1/+1
2022-08-29loop: make 'Failed to configure loopback device' log message clearerLennart Poettering2-2/+2
We print the very same log message for loopback block devices and for loopback network devices. Let's better be clear what kind it is.
2022-08-29docs: use Title Case for section titlesLennart Poettering1-7/+7
as per: https://titlecase.com/
2022-08-29test: testing for networkd NetLabel featureTopi Miettinen5-0/+32
2022-08-29network: NetLabel integrationTopi Miettinen14-1/+308
New directive `NetLabel=` provides a method for integrating static and dynamic network configuration into Linux NetLabel subsystem rules, used by Linux Security Modules (LSMs) for network access control. The label, with suitable LSM rules, can be used to control connectivity of (for example) a service with peers in the local network. At least with SELinux, only the ingress can be controlled but not egress. The benefit of using this setting is that it may be possible to apply interface independent part of NetLabel configuration at very early stage of system boot sequence, at the time when the network interfaces are not available yet, with netlabelctl(8), and the per-interface configuration with systemd-networkd once the interfaces appear later. Currently this feature is only implemented for SELinux. The option expects a single NetLabel label. The label must conform to lexical restrictions of LSM labels. When an interface is configured with IP addresses, the addresses and subnetwork masks will be appended to the NetLabel Fallback Peer Labeling rules. They will be removed when the interface is deconfigured. Failures to manage the labels will be ignored. Example: ``` [DHCPv4] NetLabel=system_u:object_r:localnet_peer_t:s0 ``` With the above rules for interface `eth0`, when the interface is configured with an IPv4 address of 10.0.0.123/8, `systemd-networkd` performs the equivalent of `netlabelctl` operation ``` $ sudo netlabelctl unlbl add interface eth0 address:10.0.0.0/8 label:system_u:object_r:localnet_peer_t:s0 ``` Result: ``` $ sudo netlabelctl -p unlbl list ... interface: eth0 address: 10.0.0.0/8 label: "system_u:object_r:localnet_peer_t:s0" ... ```
2022-08-29sd-netlink: add NetLabel supportTopi Miettinen3-7/+52
2022-08-29basic: generate netmasks for IPv6 and generic IP family addressesTopi Miettinen3-0/+96
Added functions to generate netmasks for IPv6 and generic IP family addresses.
2022-08-29scsi_id: retry inquiry ioctl if host_byte is DID_TRANSPORT_DISRUPTEDWenchao Hao1-0/+6
The inquiry is issued to kernel via ioctl, kernelspace would set this inquiry command's retry count to 0 which means the command would not be retried in kernel space even if the LLDs returned a status which need to be retried. So we should take the retry in user space.
2022-08-29condition: fix device-tree firmware pathDaniel Braunwarth1-2/+2
The path /sys/firmware/device-tree doesn't exist. This should be either /proc/device-tree or /sys/firmware/devicetree. The first path is only a link. So lets use the second path. See https://github.com/torvalds/linux/blob/v4.14/drivers/of/base.c#L218.
2022-08-29test-50-dissect: wait for and lock loop block partition devicesYu Watanabe1-4/+13
2022-08-29udevadm-wait: introduce periodic timer for checking devicesYu Watanabe1-2/+67
When --initialized=no is specified, it is not necessary to wait for uevents to be processed by udevd.
2022-08-29Revert "test: wait for loop device to be removed"Yu Watanabe1-6/+0
This reverts commit 1a0e065e9f154f46fd68cd45f46310bc7df7a51c. This does not work as expected. After `losetup --detach`, the kernel lazily removes the loop device. But, systemd-dissect should gracefully handle that. If it does not, then it is a bug in systemd-dissect. Let's not hide the real issue in systemd-dissect.
2022-08-29udevadm-settle: check validity of specified pathYu Watanabe1-0/+4
2022-08-29udevadm-settle: use sd-eventYu Watanabe1-38/+51
2022-08-29udevadm-settle: rename arg_timeout -> arg_timeout_usecYu Watanabe1-4/+4
2022-08-29udevadm-settle: check if udevd is runningYu Watanabe1-0/+4
2022-08-29udevadm-settle: make failure in udev_ctrl_new() criticalYu Watanabe1-10/+13
It should not fail in general.
2022-08-29udevadm-settle: emit deprecated warning earlierYu Watanabe1-2/+2
2022-08-29man: Minor punctuation and word tweakadrian51-2/+2
2022-08-28udev-util: minor cleanups for on_ac_power()Yu Watanabe1-7/+7
Follow-ups for #24420.
2022-08-28network: drop unused timestampYu Watanabe3-12/+0
2022-08-28test-64: run one more subtest on non-KVM environment with relaxed conditionYu Watanabe2-16/+27
2022-08-28docs: fix incorrect env var name for credentials directoryUriel Corfa1-2/+2
CREDENTIAL_PATH appears nowhere in the systemd source code. $CREDENTIALS_DIRECTORY is what is used instead.
2022-08-28shell-completion: drop unused $modeYu Watanabe1-6/+6
Fixes #24473.
2022-08-28udevadm: replace find_device_from_path() with sd_device_new_from_path()Yu Watanabe1-19/+3
2022-08-28test-network: add missing online checkYu Watanabe1-1/+1
2022-08-28udev: do not kill workers when requested to set the same log level currently ↵Yu Watanabe1-0/+10
assigned Also refuse invalid log level.
2022-08-28udev/net: drop unused timestampYu Watanabe1-1/+0
2022-08-28test-64: relax number of partitions used in testcase_simultaneous_events() ↵Yu Watanabe1-9/+12
to speed up non-KVM environment
2022-08-28tree-wide: use devpath_from_devnum() and device_open_from_devnum()Yu Watanabe12-158/+67
Fixes #24465.
2022-08-28sd-device: skip to check diskseq if device is not initializedYu Watanabe1-4/+11
2022-08-28sd-device: introduce device_open_from_devnum()Yu Watanabe2-0/+33
2022-08-28sd-device: introduce devpath_from_devnum()Yu Watanabe6-1/+70
2022-08-28devnum-util: split-out device_path_make_inaccessible()Yu Watanabe2-17/+21
2022-08-28sd-device: rename device-util.c -> device-filter.cYu Watanabe6-8/+18
The functions provided by the file are only used in sd-device.
2022-08-28growfs,repart: fix misuse of sd_device_get_devpath()Yu Watanabe2-5/+5
Follow-up for 0f79b3469f167583033d17f9a6fa0e4341a68003. To obtain device node, sd_device_get_devname() must be used.
2022-08-28test-64: extend timeout for slower env e.g. non-kvmYu Watanabe1-1/+1
2022-08-27tree-wide: fix typoYu Watanabe2-3/+3
2022-08-27hwdb: Add Dell Professional Sound Bar AE515Swapnil Devesh1-0/+4
2022-08-27loop-util: use filter provided by sd_device_enumeratorYu Watanabe1-28/+7
2022-08-27test: reload knotd after committing all zone changesFrantisek Sumsal1-0/+2
Otherwise, on Ubuntu, the DS RRs sometimes won't get propagated correctly to parent zones for some reason, ending in a loop: ``` knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative knotd[70]: info: [signed.test.] DS check, outgoing, remote 10.0.0.1@53, KSK submission check: negative ... ``` causing DNSSEC verification fails. I'm not sure why that happens (yet)...
2022-08-27test: fix delv trust anchors location on UbuntuFrantisek Sumsal1-0/+3
delv on Ubuntu defaults to /etc/bind/bind.keys instead of /etc/bind.keys when reading trust anchors, so let's create a symlink to make the test work there as well. Resolves: #24453
2022-08-27test: fix typoFrantisek Sumsal1-1/+1