summaryrefslogtreecommitdiffstats
path: root/man/systemd-homed.service.xml (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-12-17Add basic systemctl edit testнаб2-3/+17
2022-12-16TODOLennart Poettering1-0/+7
2022-12-16test: systemd-mount --list and systemd-umount requires the device is ↵Yu Watanabe1-1/+7
initialized by udevd Fixes #25674.
2022-12-16man/systemd-oomd.service: Document command line optionsJade Lovelace1-1/+18
Previously these were not written down. This PR depends on #25670, since `--dry-run` prints at debug level in `main`, which is surprising behaviour.
2022-12-15Implement SYSTEMD_HOME_MKFS_OPTIONS_* envvars to configure mkfs options for ↵Aidan Dang7-11/+46
homed LUKS directories
2022-12-15repart: Always derive fs/luks UUIDs from generated partition UUIDDaan De Meyer1-12/+25
When generating verity partitions, we only know the partition UUID of the verity data and hash partition after doing the verity formatting. This means we can't use the verity partition UUID as input for deriving the filesystem/luks UUIDs. Currently, we derive the filesystem/luks UUID from the null UUID instead, which isn't ideal. Instead, let's always generate a partition UUID and use it to derive the fs/luks UUIDs, but only use it as the actual partition UUID if we're not doing verity for the partition.
2022-12-15pcrphase: gracefully exit if TPM2 support is incompleteLennart Poettering5-6/+27
If everything points to the fact that TPM2 should work, but then the driver fails to initialize we should handle this gracefully and not cause failing services all over the place. Fixes: #25700
2022-12-15test: show and check almost all journal entries since the relevant command ↵Yu Watanabe1-9/+13
being invoked For some reasons, journal timestamps from other sources sometimes inconsistent. For example, ``` $ journalctl --file system.journal -o short-monotonic -u resmontest.service [ 1112.168109] ns1.unsigned.test resolvectl[419]: → Q: ns1.unsigned.test IN AAAA [ 1112.168109] ns1.unsigned.test resolvectl[419]: ← S: success [ 1112.168109] ns1.unsigned.test resolvectl[419]: → Q: ns1.unsigned.test IN A [ 1112.168109] ns1.unsigned.test resolvectl[419]: ← S: success [ 1112.168109] ns1.unsigned.test resolvectl[419]: ← A: ns1.unsigned.test IN A 10.0.0.1 [ 1112.171961] ns1.unsigned.test systemd[1]: resmontest.service: Failed to load configuration: No such file or directory [ 1112.172223] ns1.unsigned.test systemd[1]: resmontest.service: Trying to enqueue job resmontest.service/start/fail [ 1112.179866] ns1.unsigned.test systemd[1]: resmontest.service: Installed new job resmontest.service/start as 312 [ 1112.179894] ns1.unsigned.test systemd[1]: resmontest.service: Enqueued job resmontest.service/start as 312 [ 1112.180389] ns1.unsigned.test systemd[1]: resmontest.service: Will spawn child (service_enter_start): /usr/bin/resolvectl [ 1112.180418] ns1.unsigned.test systemd[1]: resmontest.service: Passing 0 fds to service [ 1112.180447] ns1.unsigned.test systemd[1]: resmontest.service: About to execute /usr/bin/resolvectl monitor [ 1112.180477] ns1.unsigned.test systemd[1]: resmontest.service: Forked /usr/bin/resolvectl as 419 [ 1112.180619] ns1.unsigned.test systemd[1]: resmontest.service: Changed dead -> start [ 1112.180651] ns1.unsigned.test systemd[1]: Starting resmontest.service... [ 1112.180799] ns1.unsigned.test systemd[419]: resmontest.service: Kernel keyring access prohibited, ignoring. [ 1112.180895] ns1.unsigned.test systemd[419]: resmontest.service: Executing: /usr/bin/resolvectl monitor [ 1112.181383] ns1.unsigned.test systemd[1]: resmontest.service: Got notification message from PID 419 (READY=1) [ 1112.181413] ns1.unsigned.test systemd[1]: resmontest.service: Changed start -> running [ 1112.181441] ns1.unsigned.test systemd[1]: resmontest.service: Job 312 resmontest.service/start finished, result=done [ 1112.181469] ns1.unsigned.test systemd[1]: Started resmontest.service. ``` In such case, `journalctl -f` may not show the entries what we are interested in. Fixes #25749. (At least, workarond for the issue.)
2022-12-15network: wifi: check SSID when AP interfaces go upAlvin Šipraga3-1/+45
When an AP goes up, the kernel may emit a netlink event indicating that the interface has gained carrier. In that event, we should check if the SSID has changed before attempting to reconfigure. Not doing so means that the link->ssid member is not updated, leading to a potential mismatch if some of the .network configurations match on SSID=. There are however scenarios where the above heuristic is not enough. Specifically, if the interface carrier state flip-flops within a short enough interval, the internal throttling of netlink events inside the kernel may suppress intermediate linkdown+linkup events (cf. Linux net/core/link_watch.c). So there is no linkup event to react on. To improve on the latter scenario, it is proposed to make newer kernels emit an NL80211_CMD_START_AP multicast event when an AP goes up. This event will not be dropped by link_watch. systemd-networkd can then react to such events as well, and optionally reconfigure the link if the SSID has changed. This will only work with newer kernels though.
2022-12-15core/unit: fix log messageYu Watanabe1-27/+22
As you can see in the below, the dropped dependency Before=issue-24990.service is not logged, but the dependency Before=test1.service which is not owned by the units generated by the TEST-26 is logged. Before: systemd[1]: issue-24990.service: Dependency After=test1.service dropped, merged into issue-24990.service systemd[1]: issue-24990.service: Dependency Before=test1.service dropped, merged into issue-24990.service After: systemd[1]: issue-24990.service: Dependency After=test1.service is dropped, as test1.service is merged into issue-24990.service. systemd[1]: issue-24990.service: Dependency Before=issue-24990.service in test1.service is dropped, as test1.service is merged into issue-24990.service.
2022-12-15man: add two signature key example to systemd-measureLennart Poettering1-0/+58
@keszybz asked for an example with --append= used in the systemd-measure man page. Here it is. As requested: https://github.com/systemd/systemd/pull/25224#pullrequestreview-1190709772
2022-12-15systemctl: don't unlink non-existing temporary filesLennart Poettering1-2/+5
2022-12-15systemctl: if we edit a single file only, jump to the right lineLennart Poettering1-55/+115
2022-12-15systemctl: stop using basename() at one more placeLennart Poettering1-4/+7
2022-12-15systemctl: line break string where the newlines areLennart Poettering1-2/+4
2022-12-15systemctl: minor modernizations/simplificationsLennart Poettering1-6/+7
2022-12-15systemctl: simplify trim_edit_markers()Lennart Poettering1-37/+25
This is not performance sensitive, don#t try to be smart with realloc() Follow-up for: #25305 Fixes: #25303
2022-12-15test: fix typoYu Watanabe1-1/+1
2022-12-15test-network: add a test for renaming device to current altnameNick Rosbrook2-0/+18
2022-12-15mkosi: work around a file conflict between systemd and systemd-bootFrantisek Sumsal1-0/+7
2022-12-15repart: Use "defer" in docs instead of "skip"Daan De Meyer1-5/+5
2022-12-15sd-netlink: add a test for rtnl_set_link_name()Nick Rosbrook1-0/+27
Add a test that verifies a deleted alternative name is restored on error in rtnl_set_link_name().
2022-12-15udev: attempt device rename even if interface is upNick Rosbrook1-11/+5
Currently rename_netif() will not attempt to rename a device if it is already up, because the kernel will return -EBUSY unless live renaming is allowed on the device. This restriction will be removed in a future kernel version [1]. To cover both cases, always attempt to rename the interface and return 0 if we get -EBUSY. [1] https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=bd039b5ea2a9
2022-12-15sd-netlink: restore altname on error in rtnl_set_link_nameNick Rosbrook1-3/+16
If a current alternative name is to be used to rename a network interface, the alternative name must be removed first. If interface renaming fails, restore the alternative name that was deleted if necessary.
2022-12-15Manager: also log caller of daemon-reexecLuca Boccassi1-4/+8
2022-12-15sd-netlink: do not swap old name and alternative nameNick Rosbrook1-13/+0
Commit 434a348380 ("netlink: do not fail when new interface name is already used as an alternative name") added logic to set the old interface name as an alternative name, but only when the new name is currently an alternative name. This is not the desired outcome in most cases, and the important part of this commit was to delete the new name from the list of alternative names if necessary.
2022-12-15udev/net: allow new link name as an altname before renaming happensNick Rosbrook1-2/+0
When configuring a link's alternative names, the link's new name to-be is not allowed to be included because interface renaming will fail if the new name is already present as an alternative name. However, rtnl_set_link_name will delete the conflicting alternative name before renaming the device, if necessary. Allow the new link name to be set as an alternative name before the device is renamed. This means that if the rename is later skipped (i.e. because the link is already up), then the name can at least still be present as an alternative name.
2022-12-15Revert "test: wait for the monitoring service to become active"Yu Watanabe1-5/+0
This reverts commit 5dd34c2604567320707625bc009cf01c3769605f. `resolvectl monitor` sends notify event, and systemd-run wait for the service being in active state. Hence, the loop is not necessary.
2022-12-15test: suppress echo in monitor_check_rr()Yu Watanabe1-4/+4
2022-12-15packit: drop/replace deprecated directivesFrantisek Sumsal1-9/+8
2022-12-15repart: Fix integration testDaan De Meyer1-2/+2
2022-12-15hwdb: Fix mount matrix for CSL Panther Tab HD (#25752)mvzlb1-1/+1
Commit a76d7aca sets ACCEL_MOUNT_MATRIX to match the device's casing (landscape) instead of the LCD panel (portrait).
2022-12-15update TODOLennart Poettering1-13/+0
2022-12-15test: add integration test for systemd-measure --append=Lennart Poettering1-0/+17
2022-12-15measure: add --append= switch for merging signaturesLennart Poettering2-1/+37
Often it's useful to add multiple signatures in the signature JSON file to embedd in a single .pcrsig. (For example, a signature by key X for boot phase "enter-initrd" and one by key Y for "enter-initrd:leave-initrd" or so). Make this easy, by adding the ability to append signatures to a previously generated JSON file.
2022-12-15json: add helper for adding variant to array suppressing duplicatesLennart Poettering3-1/+49
2022-12-15journal: add integration tests for log filteringQuentin Deslandes2-0/+85
Add integration tests for journald's log filtering feature.
2022-12-15journal: filter log based on LogFilterPatternsQuentin Deslandes8-0/+146
Use LogFilterPatterns from the unit's cgroup xattr in order to keep or discard log messages before writing them to the journal. When a log message is discarded, it won't be written to syslog, console... either. When a native, syslog, or standard output log message is received, systemd-journald will process it if it matches against at least one allowed pattern (if any) and none of the denied patterns (if any).
2022-12-15Create hash_ops structure to free keys of type pcre2_codeQuentin Deslandes2-0/+12
2022-12-15systemctl: add support for LogFilterPatterns for show commandQuentin Deslandes1-0/+18
Parse DBus structure send by LogFilterPatterns to print it in systemctl show.
2022-12-15journal: log filtering options support in PID1Quentin Deslandes14-1/+339
Define new unit parameter (LogFilterPatterns) to filter logs processed by journald. This option is used to store a regular expression which is carried from PID1 to systemd-journald through a cgroup xattrs: `user.journald_log_filter_patterns`.
2022-12-15set: add set_make_nulstrQuentin Deslandes3-0/+63
Add function set_make_nulstr() to create a nulstr out of a set. Behave the same way as strv_make_nulstr().
2022-12-15repart: Rework Minimize= option settingsDaan De Meyer2-9/+34
Instead of having Minimize= take a boolean let's allow for two different ways to enable it. "best" means we want the most minimal image possible, which currently is only possible for read-only filesystems but can be extended in the future with bisection to find the most minimal possible size. We also add "guess", which is the current behavior, where we populate once and use the sparse size to make a reasonable guess on a size that fits all the sources without needing to O(log(n)) tries to find the most minimal size.
2022-12-15mount-util: make mount_switch_root() take a mount propagation flagYu Watanabe4-47/+12
2022-12-15mountpoint-util: introduce mount_propagation_flag_is_valid()Yu Watanabe3-1/+6
2022-12-15mountpoint-util: rename mount_propagation_flags_to_string() and friends as ↵Yu Watanabe7-22/+22
singular
2022-12-15mount-util: mount flag is unsigned longYu Watanabe2-4/+3
2022-12-15mount-util: drop unnecessary inline attributesYu Watanabe1-2/+2
2022-12-15basic: do not output emojis if not on a proper terminalZbigniew Jędrzejewski-Szmek1-9/+9
$TERM would generally be set if we're connected to a proper graphical terminal emulator. In all other cases, in particular if $TERM is not set, we almost certainly are not connected to something that can output emojis. In particular the text console is unlikely to ever do it correctly. So let's invert the check, and only write emojis if $TERM is set. Fixes #25521.
2022-12-15pam: actually align the columnsZbigniew Jędrzejewski-Szmek1-9/+9
In 9efb224443d819b7d64ec76cb94c8aa625a8abf2 was supposed to align them, but for some reason I just added a second space everywhere.