summaryrefslogtreecommitdiffstats
path: root/modprobe.d/meson.build (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-01-17core/unit: check for correct function in vtableMike Yuan1-1/+1
Prompted by https://github.com/systemd/systemd/pull/30974/commits/61e44e01325eca50e88fc9cd400ee340081e9134
2024-01-17sd-netlink: fix rtnl_resolve_link_alternative_name()Yu Watanabe2-1/+5
Fixes a bug introduced by afdf6c3b6040ef43b05428b834f0f302c8ce9a1b.
2024-01-17exec-credential: strv_extend() handles NULL strings gracefullyLennart Poettering1-3/+2
2024-01-17tree-wide: propagate the error we got from strv_extend_xyz() to the callerLennart Poettering6-15/+20
It's a bit sloppy to return -ENOMEM rather than the actual error we already returned in the first place (even though it's always going to be ENOMEM)
2024-01-17dbus-unit: don't eat up error codes needlesslyLennart Poettering1-1/+3
2024-01-17tree-wide: port over various pieces of code to strv_extend_many()Lennart Poettering12-101/+72
2024-01-17strv: add strv_extend_many() helperLennart Poettering3-0/+88
This is supposed to be a nicer, faster replacement for the often seen pattern strv_extend_strv(l, STRV_MAKE(…), false)
2024-01-17strv: remove strv_extend_front()Lennart Poettering3-38/+1
It's entirely identical to strv_push_prepend() hence drop the duplicate definition.
2024-01-17strv: modernize strv_insert()Lennart Poettering1-10/+12
Let's use memmove() to move the string contents, rather than manual loops. Fix the overflow extension. Prefer reallocarray() over malloc()
2024-01-17hwdb: Correct display rotation on Chuwi Ubook X N4100 (#24248)hfavisado1-0/+4
2024-01-17TEST-35-LOGIN: test changes to list-sessionsMike Yuan1-17/+19
2024-01-17loginctl: add --json= and -j, decouple list-* from --output=Mike Yuan3-35/+43
--output= is documented to only affect journal output in *-status. Let's use --json= and -j standard options for list-* instead.
2024-01-17loginctl: show more info in list-sessions (ListSessionsEx())Mike Yuan1-26/+113
At the same time, 8b6c039a1ac73da006bfe9d5735515bba12ef3c4 is reverted, i.e. session state is removed from the output. It was added to workaround #26744, and doesn't really make too much sense after the issue is properly fixed.
2024-01-17logind-dbus: introduce ListSessionsEx() callMike Yuan3-4/+80
As per https://github.com/systemd/systemd/pull/30884#discussion_r1448938737
2024-01-17man: don't use versioned standard-optionsMike Yuan2-14/+2
no-pager-255 was added in #29184, which I reviewed and agreed. However, as #30887 came up, I reconsidered it a bit, and now I actually think that this should be removed. We add new tools that refer to these standard options. During the process, some options are also promoted to be standard ones. I think a more sane practice is to generally keep old tools in the loop, rather than overloading the standard-options with versions.
2024-01-16tpm2: If unsealing results in policy hash mismatch when using RSA pubkey, ↵Dan Streetman1-2/+16
possibly retry The commit e3acb4d24c68291376b11bea5787112978e2775f changed how we format a TPM2B_PUBLIC object from an openssl PEM RSA key if it used the TPM-defined "default" RSA exponent, to instead set the TPM2B_PUBLIC RSA exponent to the special-case value of 0. This broke backwards compatibility with previously-sealed data. The previous commit fixed our code to no longer use the "special case" exponent value of 0, while this commit adds a fallback check for any sealed data that used the exponent value of 0. Now unsealing should work for sealed data that used either method (either 0 or the actual value).
2024-01-16ukify: use datetime.timezone.utc instead of datetime.UTCFrantisek Sumsal1-1/+1
For compat with older Python versions, since datetime.UTC is an alias introduced in Python 3.11.
2024-01-16ci: install python3-pytest for ukify testsFrantisek Sumsal1-0/+1
2024-01-16test: check TPM2B_PUBLIC "name" during PEM->TPM2B_PUBLIC conversion testsDan Streetman1-25/+50
Check the calculated TPM2B_PUBLIC key "name" to verify our PEM->TPM2B_PUBLIC function remains consistent with previous code. This is important as the TPM2B_PUBLIC "name" is used in the Authorize policy and so any change to a key "name" would break unsealing for previously-sealed objects (see bug #30546). Note that the tpm2_tpm2b_public_from_openssl_pkey() function results in a TPM2B_PUBLIC with the same "name" as using the tpm2-tools program tpm2_loadexternal, at least as of tpm2-tools version 5.6.18, with the test keys from TEST(tpm2b_public_from_openssl_pkey) in src/test/test-tpm2.
2024-01-16test: verify PEM->TPM2B_PUBLIC conversion for RSA key with non-default exponentDan Streetman1-0/+14
The tpm2 test currently verifies PEM->TPM2B_PUBLIC conversion for an RSA key with the default exponent (0x10001); this adds verification for an RSA key with a non-default exponent.
2024-01-16tpm2: Do not use RSA exponent special-case default value in ↵Dan Streetman2-3/+11
PEM->TPM2B_PUBLIC conversion The openssl default value for an RSA key exponent value is 0x10001, and the TPM specification defines a exponent value of 0 as representing this value. The systemd code that converted an RSA PEM public key to a TPM2B_PUBLIC object previously used the exponent value directly, but commit e3acb4d24c68291376b11bea5787112978e2775f changed the conversion to use the special case exponent value of 0 for any RSA key with an exponent value of 0x10001. Because the entire TPM2B_PUBLIC object is used to calculate its "name", this difference in exponent value (0x10001 vs 0) introduced a change in the key "name". Since the Authorize policy uses the key "name" directly in its policy session hash value, this change resulted in new systemd code being unable to properly unseal any data (e.g. a LUKS volume) that was previously sealed. This reverts the code to no longer override an RSA exponent value of 0x10001 with the special case value of 0. Fixes a bug introduced by commit e3acb4d24c68291376b11bea5787112978e2775f. Fixes: #30546
2024-01-16test-network: test the default required operational state for CAN devicesYu Watanabe1-0/+4
2024-01-16network: make 'carrier' as the default required operational state for CAN deviceYu Watanabe3-4/+16
As CAN devices do not support IP address, hence the state never goes to higher than 'carrier'. Prompted by https://github.com/linux-can/can-utils/issues/68#issuecomment-1327987724.
2024-01-16wait-online: several cleanups for LinkOperationalStateYu Watanabe2-31/+21
- fix memleak in parser, - fix missing return in parser on failure, - drop unnecessary temporary argument in command line argument parser, - use recently introduced macros and helper functions.
2024-01-16network: several cleanups for LinkOperationalStateYu Watanabe3-9/+25
- introduce link_required_operstate_for_online() helper function, - use recently introduced macros and helper functions, - unconditionally serialize the minimum and maximum of required operational state.
2024-01-16network: drop unnecessary temporary variablesYu Watanabe1-8/+5
2024-01-16sd-network: modernize parse_operational_state_range()Yu Watanabe2-34/+42
- rename 'out' -> 'ret', - introduce LINK_OPERSTATE_RANGE_INVALID, - constify LINK_OPERSTATE_RANGE_DEFAULT, - drop spurious const specifier for allocated string, - etc,.
2024-01-16sd-network: introduce three helper functions for LinkOperationalStateYu Watanabe1-0/+13
2024-01-16po: Translated using Weblate (Punjabi)A S Alam1-16/+16
Currently translated at 32.1% (73 of 227 strings) Co-authored-by: A S Alam <aalam@users.noreply.translate.fedoraproject.org> Translate-URL: https://translate.fedoraproject.org/projects/systemd/master/pa/ Translation: systemd/main
2024-01-16varlink: restore debug output on incoming messagesLennart Poettering1-0/+11
Now that we can selectively suppress only sensitive fields in JSON objects we can reenable debug logging for incoming messages, which was removed in 2e3414660cb0c6a024661638d0b237d88b5a7cbc. This makes Varlink fully debuggable again: we'll see both incoming and outgoing messages, only the sensitive fields are suppressed. See: #30578
2024-01-16json: replace JSON_FORMAT_REFUSE_SENSITIVE with JSON_FORMAT_CENSOR_SENSITIVELennart Poettering4-40/+53
Previously, the flag would completely refuse formatting a JSON object if any field of it was marked sensitive. With this change we'll simply replace the subobject with the string "<sensitive data>", and show everything else. This is tremendously useful when debugging, since it means that we can again trace varlink calls through the stack: we can show all the message metadata and just suppress the actually sensitive parameters. The ability to debug this matters, and we should not hide more information that we can get away with, to keep things debuggable and maintainable.
2024-01-16json: export json_variant_is_sensitive_recursive()Lennart Poettering2-19/+31
Let's export this function, so that we can use it elsewhere. Also, while at it, let's cache the result in a flag. This is only safe if the result is positive, since we allow the flag to be enabled at any time down thre tree somewhere, which we need to look at. (We never allow it to be turned off however)
2024-01-16varlink: optionally, mark all incoming message's "parameters" field as sensitiveLennart Poettering4-10/+30
So far the varlink logic honoured the "sensitive" flag of output messages. Let's add something similar for input messages. Since we don't really know incoming messages, the flag simply controls whether the "parmaeters" field of all incoming messages should be marked as sensitive. Then, turn this on in the credentials logic and in homed, since both deal with credentials.
2024-01-16network/route: find/distinguish routes in the same way that the kernel usesYu Watanabe3-41/+147
The kernel uses different logics to find or distinguish IPv4 and IPv6 routes. Let's follow the same way that the kernel uses. See comments in the code for more details.
2024-01-16labeler: add bsod, hibernate-resume, nspawn and vmspawnMike Yuan1-0/+12
2024-01-16logind: allow Sleep() and CanSleep() dbus callsMike Yuan1-0/+8
Follow-up for cd4dd90b99ac5617431ce4f0ca1e9089197c85fd
2024-01-16network/queue: detach request from the queue only when the request is ↵Yu Watanabe5-35/+36
actually queued No effective functionality is changed in this commit. Refactoring and preparation for later commits.
2024-01-16network/queue: increase the reference counter of the request before ↵Yu Watanabe1-22/+20
processing it To prevent the request freed in req->process(). This also makes a request that is not requested by a link detached on failure. Otherwise, the request may periodically processed and failed forever.
2024-01-16user-util: honour PREFER_NSS flag in get_group_creds() the same way as we ↵Lennart Poettering1-7/+32
already do in get_user_creds() let's onour the PREFER_NSS flag also in get_group_creds() the same way we honour it in get_user_creds(). Simply to remove surprises.
2024-01-16user-util: modernize get_user_creds() + get_group_creds()Lennart Poettering2-77/+80
Let's rename return parameters to ret_xyz, and let's guarantee the usual rule to initialize all return parameters on success, and not touch any on failure.
2024-01-16creds-util: drop unnecessary includeLennart Poettering1-1/+0
Follow-up for: e653a194e490fae7d166f40762c334006d592051
2024-01-16creds-util: simplify offset calculation a bitLennart Poettering1-3/+2
Don't recalculate the overall offset entirely each time we process another header. Instead, if we already validated an earlier offset, just reuse the result, it's readily available in 'p'. No change in behaviour, just a bit of code simplification.
2024-01-16bus-polkit: don't return positive in varlink_verify_polkit_async() just ↵Lennart Poettering1-4/+3
because we already sent an error reply A positive return value means "access granted", hence if we already reply to the method call don't accidentally return positive. Follow-up for: d04c1a1c8e7c95daa483d8d52d5fc4c25fbc67f2
2024-01-16bus-polkit: explicitly cast away return value we ignoreLennart Poettering1-1/+1
2024-01-16bus-polkit: treat various well-known PK errors as deniedLennart Poettering1-2/+7
Various recognizable errors from https://www.freedesktop.org/software/polkit/docs/latest/eggdbus-interface-org.freedesktop.PolicyKit1.Authority.html#eggdbus-errordomain-org.freedesktop.PolicyKit1.Error. should be considered access failures, hence treat them like that.
2024-01-16varlink: also honour new env var $SYSTEMD_VARLINK_LISTEN in ↵Lennart Poettering2-0/+17
varlink_server_listen_auto() varlink_server_listen_auto() is supposed to be the one-stop solution for turning simple command line tools into IPC services. They aren't easy to test/debug however, since you have to invoke them through a service manager. Let's make this easier: if the SYSTEMD_VARLINK_LISTEN env var is set, let's listen on the socket specified therein. This makes things easier to gdb: just run the service from the cmdline.
2024-01-16varlink-idl: prefix all varlink IDL debug lines wit "Varlink-IDL:"Lennart Poettering1-60/+63
Let's improve debuggability of varlink IPC transactions, and separate out log messages triggered by the IPC info from others, by prefixing them with a specific prefix.
2024-01-16network/route: introduce route_get_link() and use it in log_route_debug()Yu Watanabe1-16/+33
No functional change, just refactoring and preparation for later commits.
2024-01-16vmspawn: supply a serial TTY to the kernel by defaultSam Leonard2-14/+26
2024-01-16vmspawn: ignore firmwares with enrolled-keys by defaultSam Leonard1-1/+6