summaryrefslogtreecommitdiffstats
path: root/test/test-network-generator-conversion.sh (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-10-18bpf: fix SPDX short identifier for LGPL-2.1-or-laterZbigniew Jędrzejewski-Szmek1-1/+1
2021-10-18licensing: add two missing spdx headersZbigniew Jędrzejewski-Szmek2-0/+2
Both files were developed in our tree, so they are under the default license.
2021-10-18gitattributes: mark fuzz inputs that are pure binary as suchZbigniew Jędrzejewski-Szmek1-1/+7
We also have a bunch of files that have some bytes and a lot of text, like the journal export format. For those, it is still quite useful when the tools try to diff them, so let's not mark those.
2021-10-16po: add a false positive to POTFILES.skipPiotr Drąg1-0/+1
2021-10-16homework: reuse home_validate_update_luks() at one more placeLennart Poettering3-10/+5
We have the same code at two places, let's reuse it. Given the more generic scope let's rename the function home_get_state() since it retrieve the current setup state of the LUKS logic.
2021-10-16homework: remove duplicate error logging when doing ext4 resizesLennart Poettering1-4/+7
2021-10-16homework: let's simply some code via erase_and_free()Lennart Poettering1-2/+1
2021-10-16homed,shutdown: call valgrind magic after LOOP_GET_STATUS64Lennart Poettering2-0/+20
valgrind doesn't understand LOOP_GET_STATUS64. We already work around this in various placed, via VALGRIND_MAKE_MEM_DEFINE(), but we forgot three places. Let's fix that.
2021-10-16userdb: fix type to pass to connect()Yu Watanabe1-1/+1
Fixes https://github.com/systemd/systemd/pull/20613#issuecomment-944621275.
2021-10-15homework: only do image locks for regular image filesLennart Poettering1-0/+15
If an image file is actually a block device taking a lock on it doesn't really make sense for us: it will interfere with udev's block device probing logic, and it's not going to propagated across the network anyway (which is what we are after here). Hence simply don't do it. Follow-up for 2aaf565a2da8eb0ea9adf84028c9d0ab7a90e53e
2021-10-15homework: don't bother with BLKRRPART on images that aren't block devicesLennart Poettering1-2/+2
We currently call this ioctl even if we are backed by a regular file, which is actually the common case. While this doesn't really hurt, it does result in very confusing logs.
2021-10-15Add stand-alone dm-integrity supportTony Asleson14-0/+828
This adds support for dm integrity targets and an associated /etc/integritytab file which is required as the dm integrity device super block doesn't include all of the required metadata to bring up the device correctly. See integritytab man page for details.
2021-10-15unit: networkd does not require AF_ALG anymoreYu Watanabe1-1/+1
As khash is retired.
2021-10-14dm-verity: Remove usage of integrityTony Asleson8-20/+20
There is a difference between dm-verity and dm-integrity. Remove usage of integrity from verity documentation in man pages and target files.
2021-10-14homework: fix incorrect error variable useLennart Poettering1-2/+2
2021-10-14doc: document that alloca_safe() and friends are the APIs to useLennart Poettering1-11/+19
2021-10-14alloc-util: add strdupa_safe() + strndupa_safe() and use it everywhereLennart Poettering60-131/+164
Let's define two helpers strdupa_safe() + strndupa_safe() which do the same as their non-safe counterparts, except that they abort if called with allocations larger than ALLOCA_MAX. This should ensure that all our alloca() based allocations are subject to this limit. afaics glibc offers three alloca() based APIs: alloca() itself, strndupa() + strdupa(). With this we have now replacements for all of them, that take the limit into account.
2021-10-14journal: drop unnecessary +1 in newa() expressionLennart Poettering1-4/+2
newa() does this internally anyway, no need to do this explicitly.
2021-10-14tree-wide: port all calls to alloca() to alloca_safe()Lennart Poettering6-10/+9
2021-10-14alloca-util: drop two unnecessary castsLennart Poettering1-2/+2
memset() already returns void*, no need to cast it to that.
2021-10-14alloc-util: introduce new helper alloca_safe()Lennart Poettering1-12/+13
This is like alloca(), but does two things: 1. Verifies the allocation is smaller than ALLOCA_MAX 2. Ensures we allocate at least one byte This was previously done manually in all invocations. This adds a handy helper that does that implicitly.
2021-10-14cgroup: when checking for legacy controllers, ignore any we don't care aboutDan Streetman1-0/+4
2021-10-14Ignore local files in subdirectories of mkosi.default.d/ as wellDaan De Meyer1-1/+1
2021-10-14mkosi: Add number prefixes to per-distro files for easier overridingDaan De Meyer5-0/+0
This allows developers to add override files to override per-distro settings.
2021-10-13virt: Support detection for ARM64 Hyper-V guestsBoqun Feng1-0/+1
The detection of Microsoft Hyper-V VMs is done by cpuid currently, however there is no cpuid on ARM64. And since ARM64 is now a supported architecture for Microsoft Hyper-V guests[1], then use DMI tables to detect a Hyper-V guest, which is more generic and works for ARM64. [1]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7aff79e297ee1aa0126924921fd87a4ae59d2467
2021-10-13[sd-stub] Add support for aarch64 booting via pe-entry pointMax Resch7-162/+440
2021-10-13man: document new systemd.watchdog_sec= kernel cmdline optionLennart Poettering1-3/+17
Follow-up for: b3aa73e4de614c06c4a27e5635967a0392654fbc
2021-10-13man: document new "off" setting for systemd-system.conf watchdog settingsLennart Poettering1-5/+7
2021-10-13core: allow "off" as special watchdog time to be specifiedLennart Poettering3-8/+12
Right now we already understand "default" as special string for enabling the watchdog but not reconfiguring its timeout (it is internally mapped to USEC_MAX). To be systematic this adds "off" as special string for disabling the watchdog logic (it is internally mapped to 0, which is how this behaviour was previously requested).
2021-10-13core/bpf-firewall: add missing oom checkYu Watanabe1-1/+3
Fixes CID#1464627.
2021-10-13watchdog: rename special string "infinity" taken by the watchdog timeout ↵Franck Bui4-10/+46
options to "default"
2021-10-13watchdog: handle timeout programming errors more safelyFranck Bui1-5/+17
If an error happened while the timeout value was being programmed, the error was ignored and the watchdog module used the new timeout value whereas the watchdog device was left with the previous one. Now in cases of error, the device is now disabled and closed if it wasn't opened already otherwise the previous timeout value is kept so the device is still pinged at correct intervals.
2021-10-13core: introduce systemd.watchdog_sec=<sec> optionFranck Bui1-0/+11
2021-10-13watchdog: update the documentationFranck Bui1-27/+40
While at it, split the watchdog section into a few paragraphs to make it easier to read as it becomes lengthy.
2021-10-13watchdog: passing 0 to watchdog_setup now closes the watchdogFranck Bui3-31/+32
Passing 0 meant "disable the watchdog although still kept it opened". However this case didn't seem to be useful especially since PID1 closes the device if it is passed the nul timeout. Hence let's change the meaning of watchdog_setup(0) to match PID1's behavior which allows to simplify the code a bit. Hence this patch also drops enable_watchdog().
2021-10-13watchdog: pass USEC_INFINITY to watchdog_setup() to reuse the programmed ↵Franck Bui1-17/+15
timeout value This patch changes the meaning of USEC_INFINITY value for the watchdog module. Previously passing this value was a NOP. It now has a special meaning: it requests the watchdog module to read the programmed timeout value and reuse it for pinging the device. This is mostly useful when the watchdog is started by the firmware and there's no way to reconfigure the timeout with a different value afterwards. "RuntimeWatchdogSec=infinity" in system.conf can now be used rather than putting an arbitrary value that PID1 will fail to set (even if it still felt back to the programmed timeout). Please note that "infinity" is not supposed to restore the default value of the firmware. If the value is changed after booting then "infinity" would simply reuse the current programmed value. IOW it's a NOP unless the watchdog was previously closed and in that case it will be reopened and the last programmed value reused.
2021-10-13watchdog: configuring a timeout value might not be supported by the HWFranck Bui1-8/+29
In that case we should hanlde this case more gracefully by reusing the programmed value. Fixes: #20683
2021-10-13watchdog: minor optimization in watchdog_setup()Franck Bui1-0/+4
2021-10-13watchdog: cleanup: create an helper for each ioctlFranck Bui1-46/+68
No functional changes.
2021-10-13test: show debug and verbose messageYu Watanabe3-5/+5
2021-10-13sd-device-monitor: update log message to clarify the error will be ignoredYu Watanabe1-3/+3
2021-10-13cgroup: check if any controller is in use as v1Dan Streetman1-0/+61
Check if any cgroup controller is currently being used as v1, and if so don't use cgroup unified mode. This is only checked when there is no cgroup already mounted, and is most useful when running in a container where the host is using a legacy or hybrid cgroup, since we can't (fully) use unified cgroup, as the host kernel has the cgroup controllers in use by v1. This shouldn't be needed if the container manager has pre-mounted cgroups appropriately based on the host system cgroup setup, but we can't rely on that always being the case.
2021-10-13core: serialize device cgroup bpf progs across daemon-reload/reexecAnita Zhang6-0/+57
Follows what was done in b57d75232615f98aefcf41cb145ec2ea3262857d and adds a test that verifies the device BPF program is not detached during reload/reexec.
2021-10-12sd-dhcp6-client: max_retransmit_time must be positiveYu Watanabe1-2/+2
Found by LGTM.com analysis.
2021-10-12sd-dhcp6-client: introduce dhcp6_option_can_request()Yu Watanabe4-3/+195
2021-10-12coredumpctl: stop truncating information about coredumpZbigniew Jędrzejewski-Szmek1-0/+2
With the changes to limit that print 'Found module …' over and over, we were hitting the journal field message limit, effectively truncating the info output. Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1998488.
2021-10-12network: do not request RAPID_COMMIT optionYu Watanabe7-58/+3
The option must not be included in OPTION_REQUEST option. See the "Client ORO" field in https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2 This deprecates RapidCommit= setting. Note that sd-dhcp6-client always sets the RAPID_COMMIT option in the solicit message.
2021-10-12systemd-machine-id-setup(1): "machine[d] ID" typoнаб1-1/+1
2021-10-12move mfree to macro-fundamentals.hMax Resch2-6/+7
2021-10-12shared/dissect-image: reword debug messageZbigniew Jędrzejewski-Szmek1-1/+1
I read the message and initially thought that there's some bug in time subtraction. Let's make it clear that the message is about what we'll do in the future, and not a report on how we waited up until now.