summaryrefslogtreecommitdiffstats
path: root/test/TEST-24-CRYPTSETUP/test.sh (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-06-15man: fix sd_bus_add_node_enumerator() ret_nodesMatt Johnston1-2/+3
ret_nodes is NULL terminated, the return value isn't a count.
2021-06-15man: add an example to configure default route on device with tableYu Watanabe1-2/+11
Prompted by #19911.
2021-06-15fix typoYu Watanabe2-2/+2
2021-06-15tree-wide: add missing whitespace at the end of commentsYu Watanabe34-45/+45
2021-06-15test-seccomp: Check for __NR_ppoll before use (#19858)Khem Raj1-2/+3
some newer architectures like riscv32 do not have __NR_ppoll from get go
2021-06-14repart: show partitions we don't grow/create as "unchanged"Lennart Poettering1-1/+1
The previous string was "unknown", but that's wrong, because we *do* know what we are going to do with those partitions: we leave them unmodified, hence say "unchanged" in the output, to be clearer.
2021-06-14repart: align all sizes in table to the rightLennart Poettering1-1/+6
2021-06-14test: correctly configure the NUMA node memory poolFrantisek Sumsal1-1/+1
The currently hardcoded value works with the default configuration, but breaks when QEMU_MEM != 512M (in sanitizer runs, for example). ``` # QEMU_MEM=1G make -C test/TEST-36-NUMAPOLICY/ run make: Entering directory '/home/fsumsal/repos/@systemd/systemd/test/TEST-36-NUMAPOLICY' TEST-36-NUMAPOLICY RUN: test NUMAPolicy= and NUMAMask= options + /bin/qemu-kvm -smp 8 -net none -m 1G -nographic -kernel /boot/vmlinuz-5.12.5-300.fc34.x86_64 -drive format=raw' qemu-kvm: total memory for NUMA nodes (0x20000000) should equal RAM size (0x40000000) E: QEMU failed with exit code 1 ```
2021-06-14network: update wlan information when IFF_LOWER_UP flag is gainedYu Watanabe1-12/+15
Fixes the issue mentioned at https://github.com/systemd/systemd/issues/19832#issuecomment-860269320.
2021-06-14network: add brief comment about reconfiguring interfacesYu Watanabe3-5/+7
This also renames link_reconfigure_internal() -> link_reconfigure_impl().
2021-06-14network: do not partially update wlan information on failureYu Watanabe1-13/+17
2021-06-14network: add missing increment of Link::set_flags_messagesYu Watanabe1-1/+10
link_up_or_down() will decrement the counter when the subsequent RTM_GETLINK netlink method is finished. So, we need to increment the counter here. Fixes the issue mentioned at https://github.com/systemd/systemd/issues/19832#issuecomment-860255692.
2021-06-14sd-event: always reshuffle time prioq on changing online/offline stateYu Watanabe1-22/+11
Before 81107b8419c39f726fd2805517a5b9faab204e59, the compare functions for the latest or earliest prioq did not handle ratelimited flag. So, it was ok to not reshuffle the time prioq when changing the flag. But now, those two compare functions also compare the source is ratelimited or not. So, it is necessary to reshuffle the time prioq after changing the ratelimited flag. Hopefully fixes #19903.
2021-06-14sd-event: make event_source_time_prioq_reshuffle() accept all event source typeYu Watanabe1-4/+5
But it does nothing for an event source which is neither a timer nor ratelimited.
2021-06-14sd-event: use usec_add()Yu Watanabe1-2/+2
2021-06-14sd-event: use CMP() macroYu Watanabe1-20/+17
2021-06-14sd-event: drop unnecessary "else"Yu Watanabe1-2/+2
2021-06-14Revert "Mount all fs nosuid when NoNewPrivileges=yes"Topi Miettinen4-39/+3
This reverts commit d8e3c31bd8e307c8defc759424298175aa0f7001. A poorly documented fact is that SELinux unfortunately uses nosuid mount flag to specify that also a fundamental feature of SELinux, domain transitions, must not be allowed either. While this could be mitigated case by case by changing the SELinux policy to use `nosuid_transition`, such mitigations would probably have to be added everywhere if systemd used automatic nosuid mount flags when `NoNewPrivileges=yes` would be implied. This isn't very desirable from SELinux policy point of view since also untrusted mounts in service's mount namespaces could start triggering domain transitions. Alternatively there could be directives to override this behavior globally or for each service (for example, new directives `SUIDPaths=`/`NoSUIDPaths=` or more generic mount flag applicators), but since there's little value of the commit by itself (setting NNP already disables most setuid functionality), it's simpler to revert the commit. Such new directives could be used to implement the original goal.
2021-06-14network: drop misleading debugging logs about MTUYu Watanabe1-5/+5
This fixes the following spurious logs on enumerating links: ``` wlan0: Saved original MTU 1500 (min: 256, max: 2304) wlan0: MTU is changed: 0 → 1500 (min: 256, max: 2304) ```
2021-06-14network: try to bring down before setting MAC addressYu Watanabe3-4/+50
Most real network devices refuse to set MAC address when its operstate is not down. So, setting MAC address once failed, then let's bring down the interface and retry to set. Closes #6696.
2021-06-14network: check the size of hardware address before setting MAC addressYu Watanabe1-0/+10
Also, skip to set MAC address when the current address equals to the requrested one.
2021-06-14Add a network timeout option to journal-uploadJayanth Ananthapadmanaban2-4/+23
2021-06-13doc: Add RISC-V to FAQDaniel Schaefer1-2/+2
Was added to the spec in 499f0f8209f33da0b6e3b0d6f3a13996edcc7555.
2021-06-12test/TEST-17-UDEV: use default imageZbigniew Jędrzejewski-Szmek2-8/+2
No need to build a separate 700MB image to save 3080 bytes in the default image.
2021-06-12network: always check dynamic address assignments before entering configured ↵Yu Watanabe1-38/+41
state Previously (v248 or earlier), even if no static address is configured, the link did not enter configured state, as e.g. Link::static_addresses_configured is false until the link gained its carrier. But, after the commit 1187fc337577cecd685d331eeab656be186ba3b2, the situation was changed. Static addresses, routes, and etc are requested even if the link does not have its carrier, and thus the link enters configured state when no static address and etc are specified. This makes the link does not enter configured state before it gains its carrier when at least one of dynamic address assignment protocols (e.g. DHCP) except for NDISC is enabled. Note that, unfortunately, netplan always enables ConfigureWithoutCarrier= for all virtual devices, e.g. bridge. See, https://github.com/canonical/netplan/commit/978e20f902f6b92a46dc6e0050e2172e834e4617 So, we need to support e.g. the following strange config: ``` [Netowkr] ConfigureWithoutCarrier=yes DHCP=yes ``` Fixes #19855.
2021-06-12test-network: disable dynamic addressing protocols when ↵Yu Watanabe2-1/+1
ConfigureWithoutCarrier= is enabled
2021-06-12test-network: refuse routable state when no-carrier is expectedYu Watanabe1-2/+2
If we do not set the maximum operstate in wait-online, then routable state is allowed when no-carrier state is expected.
2021-06-11test-network: add a testcase for MultiPathRoute= without interface nameYu Watanabe1-2/+2
2021-06-11network: route: set link ifindex when multi-path routes specified without ↵Yu Watanabe1-6/+12
interface name And do not set RTA_OIF attribute when multi-path routes are specified. See kernel's fib_get_nhs() in net/ipv4/fib_semantics.c. Fixes #19890.
2021-06-11sd-dhcp: refuse to set iaid if we cannot find the interfaceYu Watanabe1-18/+21
2021-06-11dhcp: do not use ifindex when generating iaid in testsYu Watanabe9-20/+48
2021-06-11sd-dhcp: do not use detect_container() to guess udev is running or notYu Watanabe1-2/+3
2021-06-11nspawn: path_is_read_only_fs() may return negative errnoYu Watanabe1-1/+1
And we usually assume /sys is not read only on error.
2021-06-11tree-wide: use sd_device_new_from_ifindex/ifname()Yu Watanabe4-18/+6
2021-06-11sd-device: introduce sd_device_new_from_ifname/ifindex()Yu Watanabe3-28/+56
2021-06-11netlink: make rtnl_resolve_link_alternative_name() optionally return the ↵Yu Watanabe2-7/+16
main interface name
2021-06-11netlink: check input name is valid before calling netlink methodYu Watanabe1-0/+3
2021-06-11netlink: move resolve_ifname() or friends to netlink-util.[ch]Yu Watanabe7-58/+56
2021-06-11network: use link_get_by_name()Yu Watanabe2-14/+4
2021-06-11docs: update coding style a bitZbigniew Jędrzejewski-Szmek1-13/+20
Say that r should be declared at the top of the function. Don't say that fixed buffers result in truncation, right after saying that they must only be used if size is known. Adjust order of examples to be consistent.
2021-06-11update TODOLennart Poettering1-36/+0
2021-06-11core: Avoid spurious realization of unit cgroupsMichal Koutný1-2/+4
Cgroups may be unnecessarily realized when they are not needed. This happens, e.g. for mount units parsed from /proc/$PID/mountinfo, check touch /run/ns_mount unshare -n sh -c "mount --bind /proc/self/ns/net /run/ns_mount" # no cgroup exists file /sys/fs/cgroup/system.slice/run-ns_mount.mount systemctl daemon-reload # the vain cgroup exists file /sys/fs/cgroup/system.slice/run-ns_mount.mount . (Such cgroups can account to a large number with many similar mounts.) The code already accounts for "lazy" realization (see various checks for Unit.cgroup_realized) but the unit_deserialize() in the reload/reexec path performs unconditional realization. Invalidate (and queue) the units for realization only if we know that they were already realized in the past. This is a safe thing to do even in the case the reload brings some new cgroup setting (controllers, BPF) because units that aren't realized will use the updated setting when the time for their realization comes. (It's not even needed to add a code comment because the current formulation suggests the changed behavior.)
2021-06-11man: clarify that global search domains apply to global servers, not all ↵Zbigniew Jędrzejewski-Szmek1-7/+8
interfaces Fixes #19257.
2021-06-11test-stat-util: don't fail under chrootZbigniew Jędrzejewski-Szmek1-6/+22
I wanted to see what is_path_read_only_fs() and is_path_temporary_fs() return in a chroot, and various tests would fail. For most of our codebase, we can assume that /proc and such are mounted, and it doesn't make sense to make the tests work in a chroot. But let's do it here. (In general, it would be useful for most stuff in src/basic/, since it's linked into libraries which might be invoked in incorrectly set up environments and should not fail too badly.)
2021-06-11kbd-model-map: add Latvian keyboard layout mappingnl67201-0/+2
2021-06-10docs/CODING_STYLE: fix some typosŠtěpán Němec1-4/+4
2021-06-10core/serialize: drop bogus deserialization of ipcns socketsZbigniew Jędrzejewski-Szmek1-21/+0
a70581ffb5c13c91c76ff73ba6f5f3ff59c5a915 added ExecRuntime.ipcns_storage_socket[], and serialization in exec_runtime_serialize(), and deserialization in exec_runtime_deserialize_one(), but also deserialization in exec_runtime_deserialize_compat(). exec_runtime_deserialize_compat() is for deserializating ExecRuntime when it was serialized as part of the unit before e8a565cb660a7a11f76180fe441ba8e4f9383771. There was never any code which would serialize ExecRuntime.ipcns_storage_socket[] this way, so the deserialization attempts are pointless.
2021-06-10core/serialization: shorten code, treat all oom error the sameZbigniew Jędrzejewski-Szmek1-21/+7
2021-06-10core/serialization: drop misleadingly-named unit_can_serialize()Zbigniew Jędrzejewski-Szmek3-10/+4
All unit types can be serialized. This function was really checking whether the unit type has custom serialization/deserialization code. But we don't need a function for this. Also, the check that both .serialize() and .deserialize_item() are defined is better written as an assert. Not we have a function which would skip serialization/deserializaton for the unit if we forgot to set either of the fields.
2021-06-10test-stat-util: add a very basic test for test_path_is_read_only()Zbigniew Jędrzejewski-Szmek1-0/+32