platform/upstream/systemd.git
6 years agosd-bus: drop references to legacy /var/run D-Bus socket
Lennart Poettering [Tue, 19 Dec 2017 14:41:58 +0000 (15:41 +0100)]
sd-bus: drop references to legacy /var/run D-Bus socket

Let's directly reference /run instead, so that we can work without /var
being around, or with /var/run being incorrectly set up.

Note that we keep the old socket path in place when referencing the
system bus of containers, as they might be foreign operating systems,
that still don't have adopted /run, and where it makes sense to use the
standardized name instead. On local systems, we insist on /run being set
up properly however, hence this limitation does not apply.

Also, get rid of the UNIX_SYSTEM_BUS_ADDRESS and
UNIX_USER_BUS_ADDRESS_FMT defines. They had a purpose when we still did
kdbus, as we then had to support two different backends. But since
that's gone, we don't need this indirection anymore, hence settle on a
one define only.

6 years agoman: let's drop references to /var/run in public man pages
Lennart Poettering [Tue, 19 Dec 2017 14:39:44 +0000 (15:39 +0100)]
man: let's drop references to /var/run in public man pages

/var/run is a legacy compatibility feature, let's avoid mentioning it.

6 years agotree-wide: install matches asynchronously
Lennart Poettering [Tue, 19 Dec 2017 11:29:04 +0000 (12:29 +0100)]
tree-wide: install matches asynchronously

Let's remove a number of synchronization points from our service
startups: let's drop synchronous match installation, and let's opt for
asynchronous instead.

Also, let's use sd_bus_match_signal() instead of sd_bus_add_match()
where we can.

6 years agotree-wide: make name requesting asynchronous in all our services
Lennart Poettering [Mon, 18 Dec 2017 21:10:11 +0000 (22:10 +0100)]
tree-wide: make name requesting asynchronous in all our services

This optimizes service startup a bit, and makes it less prone to
deadlocks.

6 years agosd-bus: when disconnecting a slot, also reset its memory
Lennart Poettering [Mon, 18 Dec 2017 20:58:14 +0000 (21:58 +0100)]
sd-bus: when disconnecting a slot, also reset its memory

Yes, we aren#t accessing this anymore after, but it's still nicer if
this is actually guaranteed.

6 years agosd-bus: add new API sd_bus_match_signal() + sd_bus_match_signal_asnyc()
Lennart Poettering [Mon, 18 Dec 2017 20:52:50 +0000 (21:52 +0100)]
sd-bus: add new API sd_bus_match_signal() + sd_bus_match_signal_asnyc()

These are convenience helpers that hide the match string logic (which we
probably should never have exposed), and instead just takes regular C
arguments.

6 years agosd-bus: add asynchronous version of sd_bus_match()
Lennart Poettering [Mon, 18 Dec 2017 20:37:03 +0000 (21:37 +0100)]
sd-bus: add asynchronous version of sd_bus_match()

We usually enqueue a number of these calls on each service
initialization. Let's do this asynchronously, and thus remove
synchronization points. This improves both performance behaviour and
reduces the chances to deadlock.

6 years agosd-bus: when removing a server-side match, do so in "fire and forget" fashion
Lennart Poettering [Mon, 18 Dec 2017 19:50:26 +0000 (20:50 +0100)]
sd-bus: when removing a server-side match, do so in "fire and forget" fashion

We currently wait for the RemoveMatch() reply, but then ignore what it
actually says. Let's optimize this a bit, and not even ask for an answer
back: just enqueue the RemoveMatch() operation, and do not request not
wait for any answer.

6 years agosd-bus: remove bus_remove_match_by_string() helper which is unused
Lennart Poettering [Mon, 18 Dec 2017 19:45:35 +0000 (20:45 +0100)]
sd-bus: remove bus_remove_match_by_string() helper which is unused

6 years agosd-bus: drop unused parameters from bus_add_match_internal()
Lennart Poettering [Mon, 18 Dec 2017 19:34:21 +0000 (20:34 +0100)]
sd-bus: drop unused parameters from bus_add_match_internal()

We don't need the match components anymore, since kdbus is gone, hence
drop it.

6 years agosd-bus: add APIs to request/release names asynchronously
Lennart Poettering [Mon, 18 Dec 2017 19:10:13 +0000 (20:10 +0100)]
sd-bus: add APIs to request/release names asynchronously

They do the same thing as their synchronous counterparts, but only
enqueue the operation, thus removing synchronization points during
service initialization.

If the callback function is passed as NULL we'll fallback to generic
implementations of the reply handlers, that terminate the connection if
the requested name cannot be acquired, under the assumption that not
being able to acquire the name is a technical problem.

6 years agobus-control: remove kdbus indirection cruft
Lennart Poettering [Mon, 18 Dec 2017 13:48:16 +0000 (14:48 +0100)]
bus-control: remove kdbus indirection cruft

When kdbus was still around we always had two implementations of the
various control calls: one for dbus1 and one for kdbus. Let'sget rid of
this, simplify things, and just merge the wrappers that used to
multiplex this with the implementations.

No change in behaviour, just some merging of functions

6 years agosd-bus: get rid of kdbus flags cruft
Lennart Poettering [Mon, 18 Dec 2017 13:21:34 +0000 (14:21 +0100)]
sd-bus: get rid of kdbus flags cruft

We only need three bits from the old kdbus flags cruft, hence let's make
them proper booleans.

6 years agobusctl: add a new --watch-bind switch
Lennart Poettering [Fri, 15 Dec 2017 21:19:34 +0000 (22:19 +0100)]
busctl: add a new --watch-bind switch

This is useful for testing, and early-boot scripting.

6 years agosd-bus: start reply callback timeouts only when the connection is established
Lennart Poettering [Mon, 18 Dec 2017 12:53:12 +0000 (13:53 +0100)]
sd-bus: start reply callback timeouts only when the connection is established

Currently, reply callback timeouts are started the instant the method
calls are enqueued, which can be very early on. For example, the Hello()
method call is enqueued right when sd_bus_start() is called, i.e. before
the socket connection and everything is established.

With this change we instead start the method timeout the moment we
actually leave the authentication phase of the connection. This way, the
timeout the kernel applies on socket connecting, and we apply on the
authentication phase no longer runs in parallel to the Hello() method
call, but all three run serially one after the other, which is
definitely a cleaner approach.

Moreover, this makes the "watch bind" feature a lot more useful, as it
allows enqueuing method calls while we are still waiting for inotify
events, without them timeouting until the connection is actually
established, i.e. when the method call actually has a chance of being
actually run.

This is a change of behaviour of course, but I think the new behaviour
is much better than the old one, since we don't race timeouts against
each other anymore...

6 years agosd-bus: optionally, use inotify to wait for bus sockets to appear
Lennart Poettering [Fri, 15 Dec 2017 21:24:52 +0000 (22:24 +0100)]
sd-bus: optionally, use inotify to wait for bus sockets to appear

This adds a "watch-bind" feature to sd-bus connections. If set and the
AF_UNIX socket we are connecting to doesn't exist yet, we'll establish
an inotify watch instead, and wait for the socket to appear. In other
words, a missing AF_UNIX just makes connecting slower.

This is useful for daemons such as networkd or resolved that shall be
able to run during early-boot, before dbus-daemon is up, and want to
connect to dbus-daemon as soon as it becomes ready.

6 years agobus: touch() the AF_UNIX sockets we listen() on after the fact
Lennart Poettering [Wed, 27 Dec 2017 17:22:31 +0000 (18:22 +0100)]
bus: touch() the AF_UNIX sockets we listen() on after the fact

We'd like to use inotify to get notified when AF_UNIX sockets become
connectable. That happens at the moment of listen(), but this is doesn't
necessarily create in a watchable inotify event. Hence, let's synthesize
one whenever we generically create a socket, or when we know we created
it for a D-Bus server.

Ideally we wouldn't have to do this, and the kernel would generate an
event anyway for this. Doing this explicitly isn't too bad however, as
the event is still nicely associated with the AF_UNIX socket node, and
we generate all D-Bus sockets in our code hence it's safe.

6 years agosocket-util: explicitly ensure there's one trailing NUL byte on AF_UNIX socket addresses
Lennart Poettering [Wed, 27 Dec 2017 16:18:02 +0000 (17:18 +0100)]
socket-util: explicitly ensure there's one trailing NUL byte on AF_UNIX socket addresses

AF_UNIX socket addresses aren't necessarily NUL terminated, however
they are usually used as strings which are assumed to be NUL terminated.
Let's hence add an extra byte to the end of the sockaddr_un structure,
that contains this NUL byte, simply for safety reasons.

Note that actually this patch changes exactly nothing IRL, as the other
sockaddr structures already are large enough to accomodate for an extra
NUL byte. The size of the union hence doesn't change at all by doing
this. The entire value of this patch is hence in the philosophical
feeling of safety, and by making something explicit that before was
implicit.

6 years agosocket-util: use parse_ip_port() for parsing IP ports
Lennart Poettering [Wed, 27 Dec 2017 16:02:36 +0000 (17:02 +0100)]
socket-util: use parse_ip_port() for parsing IP ports

Let's unify some code here, and also use parse_ip_port() for all our IP
port parsing needs in socket_address_parse().

6 years agosocket-label: tweak socket_address_listen() a bit
Lennart Poettering [Wed, 27 Dec 2017 15:59:44 +0000 (16:59 +0100)]
socket-label: tweak socket_address_listen() a bit

This changes two things when binding to AF_UNIX file system sockets:

1. When wethe socket already exists in the fs, and unlink() on it fails,
   don't bother to bind() a second time: since nothing changed it won't
   work either.

2. Also use SELinux-aware bind() for the second attempt.

6 years agosocket-label: simplify things a bit by using socket_address_get_path()
Lennart Poettering [Wed, 27 Dec 2017 15:50:24 +0000 (16:50 +0100)]
socket-label: simplify things a bit by using socket_address_get_path()

Let's make this more generic and descriptive, and let's reuse our
existing utility functions.

6 years agofs-util: rework touch_file() so that it can touch socket file nodes
Lennart Poettering [Wed, 27 Dec 2017 15:20:28 +0000 (16:20 +0100)]
fs-util: rework touch_file() so that it can touch socket file nodes

Let's rework touch_file() so that it works correctly on sockets, fifos,
and device nodes: let's open an O_PATH file descriptor first and operate
based on that, if we can. This is usually the better option as it this
means we can open AF_UNIX nodes in the file system, and update their
timestamps and ownership correctly. It also means we can correctly touch
symlinks and block/character devices without triggering their drivers.

Moreover, by operating on an O_PATH fd we can make sure that we
operate on the same inode the whole time, and it can't be swapped out in
the middle.

While we are at it, rework the call so that we try to adjust as much as
we can before returning on error. This is a good idea as we call the
function quite often without checking its result, and hence it's best to
leave the files around in the most "correct" fashion possible.

6 years agosd-bus: when attached to an sd-event loop, disconnect on processing errors
Lennart Poettering [Fri, 15 Dec 2017 21:24:16 +0000 (22:24 +0100)]
sd-bus: when attached to an sd-event loop, disconnect on processing errors

If we can't process the bus for some reason we shouldn't just disable
the event source, but log something and give up on the connection. Hence
do that, and disconnect.

6 years agosd-bus: propagate handling errors for Hello method reply directly
Lennart Poettering [Tue, 12 Dec 2017 22:26:36 +0000 (23:26 +0100)]
sd-bus: propagate handling errors for Hello method reply directly

Currently, when sd-bus is used to issue a method call, and we get a
reply and the specified reply handler fails, we log this locally at
debug priority and proceed. The idea is that a bad server-side reply
should not be fatal for the program, except when the developer
explicitly terminates the event loop.

The reply to the initial Hello() method call we issue when joining a bus
should not be handled like that however. Instead, propagate the error
immediately, as anything that is wrong with the Hello() reply should be
considered a fatal connection problem.

6 years agosd-bus: minor coding style fix
Lennart Poettering [Tue, 12 Dec 2017 22:26:08 +0000 (23:26 +0100)]
sd-bus: minor coding style fix

6 years agosd-bus: cast some syscall invocations explicitly to (void)
Lennart Poettering [Tue, 12 Dec 2017 22:24:44 +0000 (23:24 +0100)]
sd-bus: cast some syscall invocations explicitly to (void)

Let's clarify that we knowingly ignore the return values.

6 years agosd-bus: when debug logging about messages, show the same bits of it everywhere
Lennart Poettering [Tue, 12 Dec 2017 22:23:25 +0000 (23:23 +0100)]
sd-bus: when debug logging about messages, show the same bits of it everywhere

Also, include the message signature everywhere.

6 years agoio-util: make flush_fd() return how many bytes where flushed
Lennart Poettering [Tue, 12 Dec 2017 22:21:09 +0000 (23:21 +0100)]
io-util: make flush_fd() return how many bytes where flushed

This is useful so that callers know whether anything at all and how much
was flushed.

This patches through users of this functions to ensure that the return
values > 0 which may be returned now are not propagated in public APIs.

Also, users that ignore the return value are changed to do so explicitly
now.

6 years agoinstall: search preset files in /run (#7715)
John Lin [Fri, 5 Jan 2018 12:15:42 +0000 (20:15 +0800)]
install: search preset files in /run (#7715)

According to systemd.preset(5), presets files in /run should take
effect. However, before this patch, preset files in /run were
ignored.

6 years agoMerge pull request #7763 from yuwata/fix-7761
Zbigniew Jędrzejewski-Szmek [Fri, 5 Jan 2018 11:38:29 +0000 (12:38 +0100)]
Merge pull request #7763 from yuwata/fix-7761

 Revert "core/execute: RuntimeDirectory= or friends requires mount namespace"

6 years agosystemd-udevd: fix speed/duplex processing with valid .link files (#7808)
Bruce A. Johnson [Fri, 5 Jan 2018 09:02:38 +0000 (04:02 -0500)]
systemd-udevd: fix speed/duplex processing with valid .link files (#7808)

Including BitsPerSecond or Duplex values in .link files did not work when
set_slinksettings was called because the routine was not copying the base
parameters to the structure given to ioctl.  As a result, EINVAL was always
reported, and no change occurred on the Ethernet device.

6 years agoTouchpad range : add another Macbook4,1 variant (#7749)
Alexis Deruelle [Fri, 5 Jan 2018 00:17:17 +0000 (01:17 +0100)]
Touchpad range : add another Macbook4,1 variant (#7749)

#Add "Early 2008 Core 2 Duo/Penryn" Macbook4,1 match string to the existing touchpad range definition

##Symptoms
* Jerky/Jumpy cursor motion using touchpad
* "Axis value outside expected range" message in Xorg.0.log

##Fix
I followed the instructions described here :https://wayland.freedesktop.org/libinput/doc/latest/absolute_coordinate_ranges.html and came up with the following :

evdev:input:b0003v05ACp022A*
 EVDEV_ABS_00=256:1469:12
 EVDEV_ABS_01=256:829:12

The ranges and resolutions are the same as stated in the existing definition (+/- 2) so only add the match string.

6 years agohwdb: Add accel mount settings for Asus T200TA 2-in-1 (#7810)
Hans de Goede [Thu, 4 Jan 2018 18:43:27 +0000 (19:43 +0100)]
hwdb: Add accel mount settings for Asus T200TA 2-in-1 (#7810)

Add accel mount settings for the INVN6500 accelerometer found in
Asus T200TA 2-in-1 devices to 60-sensor.hwdb.

6 years agoMerge pull request #7767 from poettering/fork-wait
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 14:25:07 +0000 (15:25 +0100)]
Merge pull request #7767 from poettering/fork-wait

A variety of smaller improvements all over the place

6 years agoMerge pull request #7805 from keszybz/coverity-prep
Lennart Poettering [Thu, 4 Jan 2018 14:20:29 +0000 (15:20 +0100)]
Merge pull request #7805 from keszybz/coverity-prep

Two small workarounds to help coverity

6 years agoNEWS: add in a missing change back from 229 (#7804)
Lennart Poettering [Thu, 4 Jan 2018 12:52:50 +0000 (13:52 +0100)]
NEWS: add in a missing change back from 229 (#7804)

See:

https://lists.freedesktop.org/archives/systemd-devel/2017-July/039255.html
http://fromthecodefront.blogspot.de/2017/07/systemd-pitfalls.html

6 years agocoverity: don't use (void)0 under coverity
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 08:45:23 +0000 (09:45 +0100)]
coverity: don't use (void)0 under coverity

I'm not sure why this is needed, but apparrently coverity doesn't like
(void)0. With this change, coverity can (almost) build systemd:

CFLAGS='-D_Float128="long double"' meson cov-build -Dman=false && \
  CCACHE_DISABLE=1 COVERITY_UNSUPPORTED=1 cov-build --dir cov-int ninja -C cov-build

Patch originially by Marek Cermak <macermak@redhat.com>.

6 years agotest-routing-policy-rule: split out fd assignment from assert_se
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 12:27:51 +0000 (13:27 +0100)]
test-routing-policy-rule: split out fd assignment from assert_se

It's ugly that parentheses need to be used. Let's just split it out.
Incidentally, this will make coverity happy, because it doesn't grok
assert_se().

6 years agoupdate TODO
Lennart Poettering [Sat, 30 Dec 2017 14:21:12 +0000 (15:21 +0100)]
update TODO

6 years agofileio: minor tweak to executable_is_script()
Lennart Poettering [Sat, 30 Dec 2017 14:44:29 +0000 (15:44 +0100)]
fileio: minor tweak to executable_is_script()

If read_line() returns ENOBFUS this means the line was overly long. When
we use this for checking whether an executable is a script, then this
shouldn't be propagated as-is, but simply as "this is not a script".

6 years agofileio: tweak write_string_stream_ts() to write out trailing \n in one go even if...
Lennart Poettering [Sat, 30 Dec 2017 14:42:03 +0000 (15:42 +0100)]
fileio: tweak write_string_stream_ts() to write out trailing \n in one go even if buffering is off

This tweaks write_string_stream_ts() in one minor way: when stdio
buffering has been turned off, let's append the newline we shall append
to the buffer we write ourselves so that the kernel only gets one
syscall for the result. When buffering is enabled stdio will take care
of that anyway.

Follow-up for #7750.

6 years agosd-bus: port one use of SO_PEERCRED by getpeercred()
Lennart Poettering [Sat, 30 Dec 2017 14:20:38 +0000 (15:20 +0100)]
sd-bus: port one use of SO_PEERCRED by getpeercred()

6 years agosd-bus: let's use mfree() where we can
Lennart Poettering [Sat, 30 Dec 2017 14:19:53 +0000 (15:19 +0100)]
sd-bus: let's use mfree() where we can

6 years agosd-bus: use SO_PEERGROUPS when available to identify groups of peer
Lennart Poettering [Sat, 30 Dec 2017 14:19:15 +0000 (15:19 +0100)]
sd-bus: use SO_PEERGROUPS when available to identify groups of peer

6 years agojournald: introduce new uid_for_system_journal() helper
Lennart Poettering [Sat, 30 Dec 2017 14:17:39 +0000 (15:17 +0100)]
journald: introduce new uid_for_system_journal() helper

We use the same check at two places, let's add a tiny helper function
for it, since it's not entirely trivialy, and we changes this before
multiple times, and it's a good thing if we can change it at one place
only instead of multiple.

6 years agosocket-util: slight rework of getpeersec()
Lennart Poettering [Sat, 30 Dec 2017 14:15:44 +0000 (15:15 +0100)]
socket-util: slight rework of getpeersec()

Let's call getsockopt() in a loop, so that we can deal correctly with
the label changing while we are trying to read it.

(also, while we are at it, let's make sure that there's always one
trailing NUL byte at the end of the buffer, after all SO_PEERSEC has
zero documentation, and multiple implementing backends, hence let's
better be safe than sorry)

6 years agotree-wide: use {pid,uid,gid}_is_valid() where appropriate
Lennart Poettering [Sat, 30 Dec 2017 14:15:03 +0000 (15:15 +0100)]
tree-wide: use {pid,uid,gid}_is_valid() where appropriate

Also, drop UID/GID validity checks from getpeercred() as the kernel will
never pass us invalid UID/GID on userns, but the overflow UID/GID
instead. Add a comment about this.

6 years agocalenderspec: when normalizing, flush out UTC timezone
Lennart Poettering [Sat, 30 Dec 2017 13:07:33 +0000 (14:07 +0100)]
calenderspec: when normalizing, flush out UTC timezone

6 years agouser-util: minor updates of in_gid()
Lennart Poettering [Sat, 30 Dec 2017 13:05:41 +0000 (14:05 +0100)]
user-util: minor updates of in_gid()

Let's use newa() and use the right type for storing sysconf() return
values.

6 years agosocket-util: add new getpeergroups() call
Lennart Poettering [Sat, 30 Dec 2017 13:02:36 +0000 (14:02 +0100)]
socket-util: add new getpeergroups() call

It's a wrapper around the new SO_PEERGROUPS sockopt, similar in style as
getpeersec() and getpeercred().

6 years agotree-wide: in all threads we fork off in library code, block all signals
Lennart Poettering [Fri, 29 Dec 2017 20:21:54 +0000 (21:21 +0100)]
tree-wide: in all threads we fork off in library code, block all signals

This ensures that in all threads we fork off in the background in our
code we mask out all signals, so that our thread won't end up getting
signals delivered the main process should be getting.

We always set the signal mask before forking off the thread, so that the
thread has the right mask set from its earliest existance on.

6 years agoprocess-util: add new FORK_NEW_MOUNTNS flag to safe_fork()
Lennart Poettering [Fri, 29 Dec 2017 17:52:20 +0000 (18:52 +0100)]
process-util: add new FORK_NEW_MOUNTNS flag to safe_fork()

That way we can move one more code location to use safe_fork()

6 years agopager: let's move static variables up, to the rest of them
Lennart Poettering [Fri, 29 Dec 2017 17:14:37 +0000 (18:14 +0100)]
pager: let's move static variables up, to the rest of them

let's keep static variables together, and before the function
definitions.

6 years agopager,agent: insist that we are called from the main thread
Lennart Poettering [Fri, 29 Dec 2017 17:13:38 +0000 (18:13 +0100)]
pager,agent: insist that we are called from the main thread

We maintain static process-wide variables in these subsystems without
locking, hence let's refuse operation unless we are called from the main
thread (which we do anyway) just as a safety precaution.

6 years agotree-wide: use EXIT_SUCCESS when comparing child process exit statuses
Lennart Poettering [Fri, 29 Dec 2017 17:12:30 +0000 (18:12 +0100)]
tree-wide: use EXIT_SUCCESS when comparing child process exit statuses

When we check the exit status of a subprocess, let's compare it with
EXIT_SUCCESS rather than 0 when looking for success.

This clarifies in code what kind of variable we are looking at and what
we are doing.

6 years agotree-wide: unify the process name we pass to wait_for_terminate_and_check() with...
Lennart Poettering [Fri, 29 Dec 2017 17:09:16 +0000 (18:09 +0100)]
tree-wide: unify the process name we pass to wait_for_terminate_and_check() with the one we pass to safe_fork()

6 years agotree-wide: make use of wait_for_terminate_and_check() at various places
Lennart Poettering [Fri, 29 Dec 2017 17:07:00 +0000 (18:07 +0100)]
tree-wide: make use of wait_for_terminate_and_check() at various places

Using wait_for_terminate_and_check() instead of wait_for_terminate()
let's us simplify, shorten and unify the return value checking and
logging of waitid().  Hence, let's use it all over the place.

6 years agoprocess-spec: add another flag FORK_WAIT to safe_fork()
Lennart Poettering [Fri, 29 Dec 2017 17:01:37 +0000 (18:01 +0100)]
process-spec: add another flag FORK_WAIT to safe_fork()

This new flag will cause safe_fork() to wait for the forked off child
before returning. This allows us to unify a number of cases where we
immediately wait on the forked off child, witout running any code in the
parent after the fork, and without direct interest in the precise exit
status of the process, except recgonizing EXIT_SUCCESS vs everything
else.

6 years agoexec-util: drop redundant log message in do_spawn()
Lennart Poettering [Fri, 29 Dec 2017 16:11:49 +0000 (17:11 +0100)]
exec-util: drop redundant log message in do_spawn()

safe_fork() logs that anyway, hence no need to do this twice.

6 years agoprocess-util: rework wait_for_terminate_and_warn() to take a flags parameter
Lennart Poettering [Wed, 27 Dec 2017 23:51:19 +0000 (00:51 +0100)]
process-util: rework wait_for_terminate_and_warn() to take a flags parameter

This renames wait_for_terminate_and_warn() to
wait_for_terminate_and_check(), and adds a flags parameter, that
controls how much to log: there's one flag that means we log about
abnormal stuff, and another one that controls whether we log about
non-zero exit codes. Finally, there's a shortcut flag value for logging
in both cases, as that's what we usually use.

All callers are accordingly updated. At three occasions duplicate logging
is removed, i.e. where the old function was called but logged in the
caller, too.

6 years agoprocess-util: add another fork_safe() flag for enabling LOG_ERR/LOG_WARN logging
Lennart Poettering [Wed, 27 Dec 2017 20:49:19 +0000 (21:49 +0100)]
process-util: add another fork_safe() flag for enabling LOG_ERR/LOG_WARN logging

6 years agoraw-clone: beef up raw_clone() wrapper a bit
Lennart Poettering [Fri, 29 Dec 2017 15:45:04 +0000 (16:45 +0100)]
raw-clone: beef up raw_clone() wrapper a bit

First of all, let's return pid_t, which appears to be the correct type
given that we return PIDs, and it#s what fork() uses too.

Most importantly though, flush out our PID cache, so that the call
becomes compatible with our getpid_cached() logic.

6 years agovconsole-setup: add some void casts
Lennart Poettering [Fri, 29 Dec 2017 11:16:05 +0000 (12:16 +0100)]
vconsole-setup: add some void casts

6 years agoip-address-access: let's exit the loop after invalidating our entry a (#7803)
Lennart Poettering [Thu, 4 Jan 2018 12:24:40 +0000 (13:24 +0100)]
ip-address-access: let's exit the loop after invalidating our entry a (#7803)

CID#1382967

6 years agomeson: don't search PATH for telinit (#7770)
Mike Gilbert [Thu, 4 Jan 2018 12:14:20 +0000 (07:14 -0500)]
meson: don't search PATH for telinit (#7770)

On a typical system running systemd, the telinit in PATH is very likely to be a symlink
to systemctl. Setting TELINIT to this may result in an infinite recursion if telinit is called
and sd_booted() == 0. This may commonly occur in a chroot environment.

Bug: https://bugs.gentoo.org/642724

[zj:
The path was originally hardcoded as "/lib/upstart/telinit", but was made configurable without
changing the default in 4ad61fd1806dde23d2c99043b4bed91a196d2c82. Then the default was
changed to `/lib/sysvinit/telinit` in abaaabf40a9891014ed4c402d7beb5a67ac256b1. Then it
started being  autodetected when meson support was added in
5c23128daba7236a6080383b2a5649033cfef85c. This patch restores the behaviour that was
implemented in configure.ac at the time of its removal.]

6 years agomain: don't bother with the return value of invoke_mainloop() (#7802)
Lennart Poettering [Thu, 4 Jan 2018 11:55:21 +0000 (12:55 +0100)]
main: don't bother with the return value of invoke_mainloop() (#7802)

We don't use the return value, and we don't have to, as the call already
initializes &ret, which is the one we return as exit code from the
process.

CID#1384230

6 years agoMerge pull request #7801 from keszybz/docs-and-coverity
Lennart Poettering [Thu, 4 Jan 2018 11:38:27 +0000 (12:38 +0100)]
Merge pull request #7801 from keszybz/docs-and-coverity

Docs and coverity

6 years agofix machinectl shell (in machined) (#7785)
Shawn Landden [Thu, 4 Jan 2018 11:37:15 +0000 (03:37 -0800)]
fix machinectl shell (in machined) (#7785)

4c253ed broke machined
$machinectl shell arch
Failed to get shell PTY: Input/output error

Closes: #7779

v2: do not drop DEATHSIG flag

6 years agocore: fix mac_selinux_setup return value check
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 10:29:36 +0000 (11:29 +0100)]
core: fix mac_selinux_setup return value check

Introduced in 74da609f0d0f9112047dd746188469df3692ad4a. CID #1384210.

6 years agocore: double free in bus_timer_set_transient_property
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 10:19:55 +0000 (11:19 +0100)]
core: double free in bus_timer_set_transient_property

Introduced in 3e3c5a4571d. CID #1384233.

6 years agorun: double free
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 10:12:57 +0000 (11:12 +0100)]
run: double free

Introduced in f2b9f2c83e5b4035b22eb2f610531fce275bf55f. CID #1384218.

6 years agotest-sizeof: also add uid_t
Zbigniew Jędrzejewski-Szmek [Thu, 4 Jan 2018 10:11:16 +0000 (11:11 +0100)]
test-sizeof: also add uid_t

We had gid_t, and pid_t, but not uid_t. Add for completeness.

6 years agoman: drop --arch from debootstrap invocation
Zbigniew Jędrzejewski-Szmek [Wed, 3 Jan 2018 14:57:11 +0000 (15:57 +0100)]
man: drop --arch from debootstrap invocation

Nowadays people use systemd on many different architectures, so we
shouldn't presuppose that they are using amd64. debootstrap defaults
to the native architecture and this should be good enough.

6 years agodhcp6: Fix DHCPv6 client file descriptor and event handling (#7796)
Patrik Flykt [Thu, 4 Jan 2018 10:02:52 +0000 (12:02 +0200)]
dhcp6: Fix DHCPv6 client file descriptor and event handling (#7796)

Close DHCPv6 client socket file descriptor when
sd_dhcp6_client_stop() is called and not when client_reset() is
called. If left in client_reset(), any internal temporary stopping
of the DHCPv6 client with client_stop() will call client_reset()
after which the DHCPv6 client will not be able to receive any further
DHCPv6 messages.

Similarly, client_start() needs to enable events for the DHCPv6
socket file descriptor since a call to client_stop() will call
client_reset() which will remove it from the main loop. Events should
be turned off when no DHCPv6 messages are expected.

6 years agoREADME: EXT4_POSIX_ACL -> EXT4_FS_POSIX_ACL (#7799)
George G [Thu, 4 Jan 2018 07:53:44 +0000 (07:53 +0000)]
README: EXT4_POSIX_ACL -> EXT4_FS_POSIX_ACL (#7799)

EXT4_POSIX_ACL doesn't exist.

6 years agoMerge pull request #7793 from rojkov/fix-6456
Lennart Poettering [Wed, 3 Jan 2018 17:43:14 +0000 (18:43 +0100)]
Merge pull request #7793 from rojkov/fix-6456

resolved: fix refcounting DnsScope's conflict_queue

6 years agoMerge pull request #7759 from yuwata/dbus-api
Lennart Poettering [Wed, 3 Jan 2018 17:41:32 +0000 (18:41 +0100)]
Merge pull request #7759 from yuwata/dbus-api

DBus-API: add more options in transient units

6 years agoMerge pull request #7705 from keszybz/redo-linking
Lennart Poettering [Wed, 3 Jan 2018 17:37:00 +0000 (18:37 +0100)]
Merge pull request #7705 from keszybz/redo-linking

Redo linking

6 years agoexecute: make "runtime" argument const in exec_needs_mount_namespace()
Yu Watanabe [Sat, 30 Dec 2017 09:38:26 +0000 (18:38 +0900)]
execute: make "runtime" argument const in exec_needs_mount_namespace()

The argument can be const, then let's make so.

6 years agocore: RuntimeDirectory= does not request new mount namespace
Yu Watanabe [Wed, 3 Jan 2018 15:20:44 +0000 (00:20 +0900)]
core: RuntimeDirectory= does not request new mount namespace

Now RuntimeDirectory= does not create 'private' directory.
Thus, it is not neccessary to request new mount namespace.

Follow-up for 8092a48cc1d1fb20b66371576754df831d30a43b.

6 years agoRevert "core/execute: RuntimeDirectory= or friends requires mount namespace"
Yu Watanabe [Wed, 3 Jan 2018 15:16:53 +0000 (00:16 +0900)]
Revert "core/execute: RuntimeDirectory= or friends requires mount namespace"

This reverts commit 652bb2637aee54e3503a22d2928a929ecd7a84b3.

Fixes #7761.

6 years agohwdb: Add accelerometer orientation entry for Teclast X98 Plus II tablet (#7766)
Paul Cercueil [Wed, 3 Jan 2018 14:54:06 +0000 (15:54 +0100)]
hwdb: Add accelerometer orientation entry for Teclast X98 Plus II tablet (#7766)

6 years agofix systemd-analyze time when default.target is not reached (#7764)
Boucman [Wed, 3 Jan 2018 14:52:13 +0000 (15:52 +0100)]
fix systemd-analyze time when default.target is not reached (#7764)

Also, better error messages.

6 years agoresolved: use DNS_ANSWER_FOREACH instead of for
Dmitry Rozhkov [Wed, 3 Jan 2018 13:00:27 +0000 (15:00 +0200)]
resolved: use DNS_ANSWER_FOREACH instead of for

6 years agoresolved: skip conflict notifications for DNS-SD PTR RRs
Dmitry Rozhkov [Wed, 3 Jan 2018 12:42:13 +0000 (14:42 +0200)]
resolved: skip conflict notifications for DNS-SD PTR RRs

Enumerating DNS-SD PTR resource records are a special case and
are supposed to have non-unique keys pointing to services of the
same type running on different hosts. There's no need for them
to be checked for conflicts.

Thus don't check for conflicts such RRs.

6 years agoresolved: fix refcounting DnsScope's conflict_queue
Dmitry Rozhkov [Wed, 3 Jan 2018 12:26:53 +0000 (14:26 +0200)]
resolved: fix refcounting DnsScope's conflict_queue

Refcounting for a RR's key is done separately from refcounting
for the RR itself, but in dns_scope_notify_conflict() we don't
do that. This may lead to a situation when a RR key put in the
conflict_queue hash as a value's key gets freed upon
cache reduction when it's still referenced by the hash.

Thus increase refcount for the key when putting it into the hash
and unreference it upon removing from the hash.

Closes #6456

6 years agomeson: add a single .h file to shared libs with no sources
Zbigniew Jędrzejewski-Szmek [Wed, 20 Dec 2017 08:12:08 +0000 (09:12 +0100)]
meson: add a single .h file to shared libs with no sources

Otherwise stuff doesn't build on old Ubuntu with meson-0.42.1-1~xenial.

6 years agomeson: use a convenience lib for shared resolve files
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 21:46:01 +0000 (22:46 +0100)]
meson: use a convenience lib for shared resolve files

This reduces the man=false meson target count from 1281 to 1253.

--

A fully scientific test:
  git grep _sources, :/*.build|cut -d: -f2|tr -d ' '|sort|uniq -c
reveals that libudev_sources is the only source list now reused twice.  There's
some ugly circular dependency between libudev and libshared, and anyway I'm not
sure if we don't want to use different compilation options (LOG_REALM_…) in
those two cases, so I'm leaving that alone for now.

6 years agomeson: rename libudev_internal to libudev_static and link into libudev
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 19:54:46 +0000 (20:54 +0100)]
meson: rename libudev_internal to libudev_static and link into libudev

This reduces the meson man=false target count to 1281.

v2:
- link test-engine with libshared instead of libsystemd_static
Previous version built fine on F27, but fails on F26 with the following error:
/usr/bin/ld: /tmp/ccr8HRGw.ltrans6.ltrans.o: undefined reference to symbol '__start_BUS_ERROR_MAP@@SD_SHARED'
/home/zbyszek/fedora/systemd/systemd-9d5aae75c64f5583a110f03b94816aacc03bbf4d/x86_64-redhat-linux-gnu/src/shared/libsystemd-shared-236.so: error adding symbols: DSO missing from command line

v3:
- add libudev_basic

6 years agomeson: use a convenience lib for journal user sources
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 18:38:43 +0000 (19:38 +0100)]
meson: use a convenience lib for journal user sources

Instead of compiling those files twice, once for libsystemd and once for
libshared, compile once as a static archive and then link into both.
This reduce the meson target for man=no compile to 1291.

6 years agomeson: link libsystemd_static in libshared instead of recompiling
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 18:14:03 +0000 (19:14 +0100)]
meson: link libsystemd_static in libshared instead of recompiling

This is similar to the great-grandpa commit. This time the number
of meson targets compilation without man is reduced from 1347 to 1302.

6 years agoMove gcrypt-util to basic/
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 18:06:56 +0000 (19:06 +0100)]
Move gcrypt-util to basic/

We were including gcrypt-util.[ch] by hand in the few places where it
was used. Create a convenience library to avoid compiling the same
files multiple times.

v2:
- use a separate static library instead of mergin into libbasic

6 years agomeson: link libbasic and libshared_static into libshared
Zbigniew Jędrzejewski-Szmek [Tue, 19 Dec 2017 13:19:46 +0000 (14:19 +0100)]
meson: link libbasic and libshared_static into libshared

gcrypt_util_sources had to be moved because otherwise they appeared twice
in libshared.so halfproducts, causing an error.

-fvisibility=default is added to libbasic, libshared_static so that the symbols
appear properly in the exported symbol list in libshared.

The advantage is that files are not compiled twice. When configured with -Dman=false,
the ninja target list is reduced from 1588 to 1347 targets. The difference in compilation
time is small (<10%). I think this is because of -O0 and ccache and multiple cores, and
in different settings the compilation time could be reduced. The main advantage is that
errors and warnings are not reported twice.

6 years agodbus-cgroup: simplify bus_cgroup_set_property()
Yu Watanabe [Tue, 2 Jan 2018 17:30:16 +0000 (02:30 +0900)]
dbus-cgroup: simplify bus_cgroup_set_property()

6 years agodbus-cgroup: add missing space
Yu Watanabe [Tue, 2 Jan 2018 17:28:17 +0000 (02:28 +0900)]
dbus-cgroup: add missing space

6 years agodoc: update TRANSIENT-SETTINGS.md
Yu Watanabe [Fri, 29 Dec 2017 14:05:37 +0000 (23:05 +0900)]
doc: update TRANSIENT-SETTINGS.md

6 years agobus-unit-util: support more options set to transient unit
Yu Watanabe [Mon, 1 Jan 2018 17:11:26 +0000 (02:11 +0900)]
bus-unit-util: support more options set to transient unit

6 years agobus-unit-util: use struct __useless_struct_to_allow_trailing_semicolon__ in DEFINE_BU...
Yu Watanabe [Mon, 1 Jan 2018 15:50:19 +0000 (00:50 +0900)]
bus-unit-util: use struct __useless_struct_to_allow_trailing_semicolon__ in DEFINE_BUS_APPEND_PARSE{,_PTR} macro

6 years agodbus-path: add Paths= option to set path specs in transient path unit
Yu Watanabe [Mon, 1 Jan 2018 17:25:57 +0000 (02:25 +0900)]
dbus-path: add Paths= option to set path specs in transient path unit

6 years agodbus-service: expose *ExitStatus= settings on bus
Yu Watanabe [Tue, 2 Jan 2018 17:32:10 +0000 (02:32 +0900)]
dbus-service: expose *ExitStatus= settings on bus