summaryrefslogtreecommitdiffstats
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #15566 from poettering/destroy-binfmtLennart Poettering2020-04-235-9/+61
|\ | | | | unregister binary formats during shutdown
| * binfmt: also unregister binfmt entries from unitLennart Poettering2020-04-231-2/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We unregister binfmt_misc twice during shutdown with this change: 1. A previous commit added support for doing that in the final shutdown phase, i.e. when we do the aggressive umount loop. This is the robust thing to do, in case the earlier ("clean") shutdown phase didn't work for some reason. 2. This commit adds support for doing that when systemd-binfmt.service is stopped. This is a good idea so that people can order mounts before the service if they want to register binaries from such mounts, as in that case we'll undo the registration on shutdown again, before unmounting those mounts. And all that, just because of that weird "F" flag the kernel introduced that can pin files... Fixes: #14981
| * binfmt: modernize code a bitLennart Poettering2020-04-231-7/+6
| | | | | | | | | | | | Let's just copy out the bit of the string we need, and let's make sure we refuse rules called "status" and "register", since those are special files in binfmt_misc's file system.
| * shutdown: unregister all binfmt_misc entries before entering shutdown loopLennart Poettering2020-04-231-0/+2
| | | | | | | | | | | | | | | | Apparently if the new "F" flag is used they might pin files, which blocks us from unmounting things. Let's hence clear this up explicitly. Before entering our umount loop. Fixes: #14981
| * shared: add common helper for unregistering all binfmt entriesLennart Poettering2020-04-233-0/+39
| |
* | home: fix strv NUL terminationLennart Poettering2020-04-231-1/+1
| | | | | | | | Fixes: #15559
* | networkd: don't do lldp rx nor tx on bond devicesLennart Poettering2020-04-232-5/+10
| | | | | | | | Fixes: #15146
* | Merge pull request #15563 from keszybz/wait-callback-tweakLennart Poettering2020-04-232-20/+15
|\ \ | | | | | | Add NULL callback check in one more place
| * | shared: add NULL callback check in one more placeZbigniew Jędrzejewski-Szmek2020-04-231-18/+13
| | | | | | | | | | | | Follow-up for 9f65637308.
| * | core: fix unused variable warning when !HAVE_SECCOMPZbigniew Jędrzejewski-Szmek2020-04-231-2/+2
| | |
* | | Merge pull request #15561 from poettering/udev-memdup-fixLennart Poettering2020-04-231-6/+4
|\ \ \ | | | | | | | | udev: nulstr NUL termination fix
| * | | udev: use STR_IN_SET() wher eit makes senseLennart Poettering2020-04-231-5/+1
| | | |
| * | | udev: prepare memory for extra NUL termination for NULSTRLennart Poettering2020-04-231-1/+3
| |/ / | | | | | | | | | Fixes: #15162
* | | Merge pull request #15504 from poettering/cmsg-find-pureLennart Poettering2020-04-2316-91/+129
|\ \ \ | |_|/ |/| | just the recvmsg_safe() stuff from #15457
| * | tree-wide: use recvmsg_safe() at various placesLennart Poettering2020-04-2315-91/+106
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Let's be extra careful whenever we return from recvmsg() and see MSG_CTRUNC set. This generally means we ran into a programming error, as we didn't size the control buffer large enough. It's an error condition we should at least log about, or propagate up. Hence do that. This is particularly important when receiving fds, since for those the control data can be of any size. In particular on stream sockets that's nasty, because if we miss an fd because of control data truncation we cannot recover, we might not even realize that we are one off. (Also, when failing early, if there's any chance the socket might be AF_UNIX let's close all received fds, all the time. We got this right most of the time, but there were a few cases missing. God, UNIX is hard to use)
| * | socket-util: add recvmsg_safe() wrapper that handles MSG_CTRUNCLennart Poettering2020-04-232-0/+23
| | |
* | | Merge pull request #15472 from keszybz/dbus-api-docsLennart Poettering2020-04-2312-26/+26
|\ \ \ | |_|/ |/| | A few more dbus api documentation updates
| * | tree-wide: use "hostname" spelling everywhereZbigniew Jędrzejewski-Szmek2020-04-2112-26/+26
| | | | | | | | | | | | | | | | | | | | | | | | It's not that I think that "hostname" is vastly superior to "host name". Quite the opposite — the difference is small, and in some context the two-word version does fit better. But in the tree, there are ~200 occurrences of the first, and >1600 of the other, and consistent spelling is more important than any particular spelling choice.
* | | Merge pull request #15543 from poettering/fix-ubsan-sd-busLennart Poettering2020-04-236-16/+22
|\ \ \ | | | | | | | | sd-bus: work around ubsan warning
| * | | acpi-fpdt: mark structures as packedLennart Poettering2020-04-231-4/+4
| | | | | | | | | | | | | | | | Let's make sure the alignment doesn't matter.
| * | | sd-bus: work around ubsan warningLennart Poettering2020-04-235-12/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ubsan complains that we add an offset to a NULL ptr here in some cases. Which isn't really a bug though, since we only use it as the end condition for a for loop, but we can still fix it... Fixes: #15522
* | | | shared: Don't try calling NULL callback in bus_wait_for_units_clearBalint Reczey2020-04-231-1/+2
| | | | | | | | | | | | | | | | BugLink: https://bugs.launchpad.net/bugs/1870930
* | | | Merge pull request #15544 from poettering/fix-journalctl-namespaceLennart Poettering2020-04-231-3/+4
|\ \ \ \ | | | | | | | | | | sd-journal: fix namespace check
| * | | | sd-journal: don't check namespaces if we have no namespace to go byLennart Poettering2020-04-231-3/+4
| | |_|/ | |/| | | | | | | | | | Fixes: #15528
* | | | Merge pull request #15538 from poettering/nspawn-no-netnsLennart Poettering2020-04-231-6/+59
|\ \ \ \ | | | | | | | | | | nspawn: politely refuse --image= when run inside non-host netns
| * | | | nspawn: refuse politely when we are run in the non-host netns in combination ↵Lennart Poettering2020-04-231-0/+56
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | with --image= Strictly speaking this doesn't really fix #15079, but it at least means we won't hang anymore. Fixes: #15079
| * | | | nspawn: minor simplificationLennart Poettering2020-04-231-6/+3
| |/ / /
* / / / run: don't wait for start job to complete when running interactively anywayLennart Poettering2020-04-231-1/+5
|/ / / | | | | | | | | | | | | | | | | | | | | | Otherwise we'd not read the services input while waiting for the job to wait, and there's no point in waiting for the job anyway if we wait for the unit to stop ultimately. Fixes: #15395
* | | Merge pull request #15530 from ssahani/lpr-dhcpv4-option-9Zbigniew Jędrzejewski-Szmek2020-04-2317-7/+136
|\ \ \ | |/ / |/| | network: add support to DHCPv4 server/client option 9 LPR
| * | networkctl: Add support to display LPR serversSusant Sahani2020-04-221-1/+5
| | |
| * | sd-network: Add support to retrive LPR serversSusant Sahani2020-04-222-0/+7
| | |
| * | network: Add support send and receive LPR serversSusant Sahani2020-04-227-4/+69
| | |
| * | sd-network: DHCPv4 Add support to send and receive LPR servers.Susant Sahani2020-04-227-2/+55
| | |
* | | Merge pull request #15546 from poettering/pid1-serialize-comand-fixZbigniew Jędrzejewski-Szmek2020-04-231-5/+14
|\ \ \ | | | | | | | | core: make sure to restore the control command id, too
| * | | core: make sure to restore the control command id, tooLennart Poettering2020-04-221-2/+3
| | | | | | | | | | | | | | | | Fixes: #15356
| * | | core: some minor clean-ups/modernizationsLennart Poettering2020-04-221-3/+11
| | | |
* | | | Merge pull request #15516 from poettering/nspawn-resolv-confZbigniew Jędrzejewski-Szmek2020-04-235-25/+46
|\ \ \ \ | | | | | | | | | | beef up --resolv-conf= options of systemd-nspawn
| * | | | nspawn: beef up --resolve-conf= modesLennart Poettering2020-04-223-16/+37
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Let's add flavours for copying stub/uplink resolv.conf versions. Let's add a more brutal "replace" mode, where we'll replace any existing destination file. Let's also change what "auto" means: instead of copying the static file, let's use the stub file, so that DNS search info is copied over. Fixes: #15340
| * | | | resolve: move resolv.conf path definitions to shared headerLennart Poettering2020-04-222-9/+9
| |/ / / | | | | | | | | | | | | That way we can use it from nspawn.
* | | | nspawn: some minor modernizationsLennart Poettering2020-04-231-7/+11
| | | |
* | | | Merge pull request #15507 from poettering/bus-log-apiZbigniew Jędrzejewski-Szmek2020-04-2218-84/+222
|\ \ \ \ | | | | | | | | | | add generic bus interface for setting log level that can be implemented by any daemon
| * | | | core: implement generic log control API in PID1 tooLennart Poettering2020-04-213-0/+20
| | | | | | | | | | | | | | | | | | | | | | | | | It has slightly different setters in place, so it needs some special love, which is easy enough though.
| * | | | core: use generic implementations of log level/target bus propertier gettersLennart Poettering2020-04-211-25/+3
| | | | | | | | | | | | | | | | | | | | The setters are slightly different, hence keep them as they are for now.
| * | | | tree-wide: implement new log control API dbus interface in all our daemonsLennart Poettering2020-04-2110-0/+50
| | | | |
| * | | | resolved: replace private log level control API with generic oneLennart Poettering2020-04-212-57/+9
| | | | | | | | | | | | | | | | | | | | | | | | | The property was just added, let's replace it again. Given that it was never released this should not be an API breakage.
| * | | | log-control-api: add generic D-Bus interface for querying/setting log ↵Lennart Poettering2020-04-213-2/+140
| | |_|/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | level/target Let's define a new, generic bus interface that any daemon can implement for querying/setting the log level. We can turn this into something more powerful later on, but for now, only expose three properties: the log level, log target and the syslog identifier (with the former two being writable). This is supposed to be generic, so that it can be implemented by 3rd party daemons too, eventually.
* | | | core: make sure we don't get confused when setting TERM for a tty fdLennart Poettering2020-04-221-4/+5
| |/ / |/| | | | | | | | Fixes: #15344
* | | Merge pull request #15526 from bluca/start_stop_wait_debugZbigniew Jędrzejewski-Szmek2020-04-222-4/+13
|\ \ \ | | | | | | | | Add debug log when a job in the activation queue is not runnable
| * | | core: add debug log when a job in the activation queue is not runnableLuca Boccassi2020-04-221-2/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | When a job is skipped due its dependencies not being ready, log a debug message saying what is holding it back. This was very useful with transient units timing out to figure out where the problem was.
| * | | core: add log_get_max_level check optimization in log_unit_fullLuca Boccassi2020-04-211-2/+3
| |/ / | | | | | | | | | | | | | | | Just as log_full already does, check if the log level would result in logging immediately in the macro in order to avoid doing unnecessary work that adds up in hot spots.