Daniel Mack [Mon, 6 Jul 2015 18:44:33 +0000 (14:44 -0400)]
Merge pull request #496 from poettering/ipv6-privacy
networkd: various fixes for the IPv6 privacy extensions support
Lennart Poettering [Mon, 6 Jul 2015 18:29:33 +0000 (20:29 +0200)]
networkd: various fixes for the IPv6 privacy extensions support
- Make sure that the IPv6PrivacyExtensions=yes results in
prefer-temporary, not prefer-public.
- Introduce special enum value "kernel" to leave setting unset, similar
how we have it for the IP forwarding settings.
- Bring the enum values in sync with the the strings we parse for them,
to the level this makes sense (specifically, rename "disabled" to
"no", and "prefer-temporary" to "yes").
- Make sure we really set the value to to "no" by default, the way it is
already documented in the man page.
- Fix whitespace error.
- Make sure link_ipv6_privacy_extensions() actually returns the correct
enum type, rather than implicitly casting it to "bool".
- properly size formatting buffer for ipv6 sysctl value
- Don't complain if /proc/sys isn't writable
- Document that the enum follows the kernel's own values (0 = off, 1 =
prefer-public, 2 = prefer-temporary)
- Drop redundant negating of error code passed to log_syntax()
- Manpage fixes
This fixes a number of issues from PR #417
Daniel Mack [Mon, 6 Jul 2015 18:22:23 +0000 (14:22 -0400)]
Merge pull request #495 from poettering/forwarding-fix
networkd: be more defensive when writing to ipv4/ipv6 forwarding sett…
David Herrmann [Mon, 6 Jul 2015 17:07:10 +0000 (19:07 +0200)]
NEWS: mention ipv6 privacy extensions
Kay Sievers [Mon, 6 Jul 2015 15:54:40 +0000 (17:54 +0200)]
bus-proxyd: fix log message and explain dbus-1 compat matches
Kay Sievers [Mon, 6 Jul 2015 15:46:43 +0000 (17:46 +0200)]
docs: add .gitignore
Kay Sievers [Mon, 6 Jul 2015 15:45:26 +0000 (17:45 +0200)]
bus-proxyd: subscribe to unicast signals directed to the proxy connection
David Herrmann [Mon, 6 Jul 2015 15:43:36 +0000 (17:43 +0200)]
sd-bus: support matching on destination names
Right now, we never install destination matches on kdbus as the kernel did
not support MATCH rules on those. With the introduction of
KDBUS_ITEM_DST_ID we can now match on destination IDs, so add explicit
support for those.
This requires a recent kdbus module to work. However, there seems to be no
user-space that uses "Destination=''" matches, yet, so old kdbus modules
still work fine (we couldn't find any real user).
This is needed to match on unicast signals in bus-proxy. A followup will
add support for this.
Daniel Mack [Mon, 6 Jul 2015 13:00:04 +0000 (09:00 -0400)]
Merge pull request #491 from torstehu/fix-typo
treewide: fix typos
Lennart Poettering [Mon, 6 Jul 2015 11:38:47 +0000 (13:38 +0200)]
networkd: be more defensive when writing to ipv4/ipv6 forwarding settings
1) never bother with setting the flag for loopback devices
2) if we fail to write the flag due to EROFS (which is likely to happen
in containers where /proc/sys is read-only) or any other error, check
if the flag already has the right value. If so, don't complain.
Closes #469
Torstein Husebø [Thu, 2 Jul 2015 13:18:29 +0000 (15:18 +0200)]
treewide: fix typos
Lennart Poettering [Mon, 6 Jul 2015 10:35:58 +0000 (12:35 +0200)]
update TODO
Lennart Poettering [Mon, 6 Jul 2015 10:35:51 +0000 (12:35 +0200)]
nspawn: fix indenting
Tom Gundersen [Mon, 6 Jul 2015 09:35:12 +0000 (11:35 +0200)]
Merge pull request #443 from ssahani/lldp
lldp: set correct state for processing
Daniel Mack [Sun, 5 Jul 2015 17:08:13 +0000 (13:08 -0400)]
Merge pull request #417 from ssahani/ipv6-private
Ipv6 private extensions
Kay Sievers [Sun, 5 Jul 2015 14:22:30 +0000 (16:22 +0200)]
rules: block - add dasd to whitelist
Kay Sievers [Sun, 5 Jul 2015 14:10:03 +0000 (16:10 +0200)]
build-sys: bump sonames
Kay Sievers [Sun, 5 Jul 2015 14:05:54 +0000 (16:05 +0200)]
hwdb: update
Kay Sievers [Sun, 5 Jul 2015 14:02:13 +0000 (16:02 +0200)]
NEWS: update
David Herrmann [Sun, 5 Jul 2015 10:24:29 +0000 (12:24 +0200)]
core: fix missing bus-util.h include
Whoopsy, forgot to 'git add' this, sorry.
David Herrmann [Sun, 5 Jul 2015 09:25:38 +0000 (11:25 +0200)]
core: don't mount kdbusfs if not wanted
Just like we conditionalize loading kdbus.ko, we should conditionalize
mounting kdbusfs. Otherwise, we might run with kdbus if it is builtin,
even though the user didn't want this.
David Herrmann [Sun, 5 Jul 2015 09:04:59 +0000 (11:04 +0200)]
NEWS: mention accelerometer removal for 222
Add NEWS entry for 222 and mention the removal of the udev accelerometer.
iio-sensor-proxy-1.0 is required if you want orientation data to still
work.
Susant Sahani [Sun, 5 Jul 2015 05:55:54 +0000 (11:25 +0530)]
TODO: remove ipv6 Ipv6 privacy extensions
Susant Sahani [Sun, 5 Jul 2015 05:55:20 +0000 (11:25 +0530)]
man: add manual for ipv6 privacy extension
Susant Sahani [Sun, 5 Jul 2015 05:54:31 +0000 (11:24 +0530)]
networkd: Add support for ipv6 privacy extension
This patch add support for ipv6 privacy extensions.
The variable /proc/sys/net/ipv6/conf/<if>/use_tempaddr
can be changed via the boolean
IPv6PrivacyExtensions=[yes/no/prefer-temporary]
When true enables privacy extensions, but prefer public addresses over
temporary addresses.
prefer-temporary prefers temporary adresses over public addresses.
Defaults to false.
[Match]
Name=enp0s25
[Network]
IPv6PrivacyExtensions=prefer-temporary
Zbigniew Jędrzejewski-Szmek [Sat, 4 Jul 2015 23:47:48 +0000 (19:47 -0400)]
Merge pull request #488 from miguelinux/boot
bootctl: fix sdboot to systemd-boot
Miguel Bernal Marin [Sat, 4 Jul 2015 22:03:50 +0000 (17:03 -0500)]
bootctl: fix sdboot to systemd-boot
sdboot was renamed to systemd-boot
Fixes:
e7dd673d1e0a ("gummiboot/sd-boot/systemd-boot: rename galore")
Signed-off-by: Miguel Bernal Marin <miguel.bernal.marin@linux.intel.com>
David Herrmann [Sat, 4 Jul 2015 11:08:29 +0000 (13:08 +0200)]
man: fix sysctl references in networkd-manpage
We refer to the same sysctl-setting twice, which is misleading. Correctly
list all global forwarding options. As we _always_ change the forwarding
setting on links, they will get disabled by default. The global sysctl
defaults thus will not have any effect.
David Herrmann [Sat, 4 Jul 2015 10:41:01 +0000 (12:41 +0200)]
Merge pull request #485 from poettering/sd-bus-flush-close-unref
sd-bus: introduce new sd_bus_flush_close_unref() call
David Herrmann [Sat, 4 Jul 2015 10:19:32 +0000 (12:19 +0200)]
core: fix coding style in agent-handling
Avoid late bail-out based on a condition. This makes code hard to read.
Instead, reverse the forwarding-condition.
David Herrmann [Sat, 4 Jul 2015 10:14:45 +0000 (12:14 +0200)]
core: harden cgroups-agent forwarding
On dbus1, we receive systemd1.Agent signals via the private socket, hence
it's trusted. However, on kdbus we receive it on the system bus. We must
make sure it's sent by UID=0, otherwise unprivileged users can fake it.
Furthermore, never forward broadcasts we sent ourself. This might happen
on kdbus, as we forward the message on the same bus we received it on,
thus ending up in an endless loop.
David Herrmann [Sat, 4 Jul 2015 10:11:22 +0000 (12:11 +0200)]
busctl: flush stdout after dumping data
Running `busctl monitor` currently buffers data for several seconds /
kilobytes before writing stdout. This is highly confusing if you dump in a
file, ^C busctl and then end up with a file with data of the last few
_seconds_ missing.
Fix this by explicitly flushing after each signal.
Lennart Poettering [Fri, 3 Jul 2015 18:08:14 +0000 (20:08 +0200)]
Merge pull request #484 from xnox/persistent-journal
journal: in persistent mode create /var/log/journal, with all parents.
Lennart Poettering [Fri, 3 Jul 2015 17:49:03 +0000 (19:49 +0200)]
sd-bus: introduce new sd_bus_flush_close_unref() call
sd_bus_flush_close_unref() is a call that simply combines sd_bus_flush()
(which writes all unwritten messages out) + sd_bus_close() (which
terminates the connection, releasing all unread messages) +
sd_bus_unref() (which frees the connection).
The combination of this call is used pretty frequently in systemd tools
right before exiting, and should also be relevant for most external
clients, and is hence useful to cover in a call of its own.
Previously the combination of the three calls was already done in the
_cleanup_bus_close_unref_ macro, but this was only available internally.
Also see #327
Daniel Mack [Fri, 3 Jul 2015 17:04:58 +0000 (13:04 -0400)]
Merge pull request #478 from systemd/revert-429-nspawn-userns-uid-shift-autodetection-fix
Revert "nspawn: determine_uid_shift before forking"
Dimitri John Ledkov [Fri, 3 Jul 2015 10:34:12 +0000 (11:34 +0100)]
journal: in persistent mode create /var/log/journal, with all parents.
systemd-journald races with systemd-tmpfiles-setup, and hence both are
started at about the same time. On a bare-bones system (e.g. with
empty /var, or even non-existent /var), systemd-tmpfiles will create
/var/log. But it can happen too late, that is systemd-journald already
attempted to mkdir /var/log/journal, ignoring the error. Thus failing
to create /var/log/journal. One option, without modifiying the
dependency graph is to create /var/log/journal directory with parents,
when persistent storage has been requested.
Lennart Poettering [Fri, 3 Jul 2015 10:54:22 +0000 (12:54 +0200)]
Merge pull request #480 from rinrinne/fix-message
Fix error message for enumerate addresses
Lennart Poettering [Fri, 3 Jul 2015 10:30:53 +0000 (12:30 +0200)]
Revert "nspawn: determine_uid_shift before forking"
rinrinne [Fri, 3 Jul 2015 10:13:35 +0000 (19:13 +0900)]
Fix error message for enumerate addresses
Error message for enumerating addresses was not 'addresses' but 'links'.
This patch fixes it.
Lennart Poettering [Fri, 3 Jul 2015 08:11:33 +0000 (10:11 +0200)]
Merge pull request #473 from richardmaw-codethink/machinectl-import-earlier-than-3-15
util: fall back in rename_noreplace when renameat2 isn't implemented
Gerd Hoffmann [Mon, 29 Jun 2015 07:42:11 +0000 (09:42 +0200)]
login: add rule for qemu's pci-bridge-seat
Qemu provides a separate pci-bridge exclusively for multi-seat setups.
The normal pci-pci bridge ("-device pci-bridge") has 1b36:0001. The new
pci-bridge-seat was specifically added to simplify guest-side
multiseat configuration. It is identical to the normal pci-pci bridge,
except that it has a different id (1b36:000a) so we can match it and
configure multiseating automatically.
Make sure we always treat this as separate seat if we detect this, just
like other "Pluggable" devices.
(David: write commit-message)
Richard Maw [Thu, 2 Jul 2015 13:04:34 +0000 (13:04 +0000)]
util: fall back in rename_noreplace when renameat2 isn't implemented
According to README we only need 3.7, and while it may also make sense
to bump that requirement when appropriate, it's trivial to fall back
when renameat2 is not available.
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:41:32 +0000 (09:41 -0400)]
Merge pull request #472 from keszybz/documentation-updates2
Documentation updates
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:25:59 +0000 (09:25 -0400)]
Merge pull request #470 from marineam/escape
escape: fix exit code
Zbigniew Jędrzejewski-Szmek [Thu, 2 Jul 2015 13:24:04 +0000 (09:24 -0400)]
Merge pull request #427 from keszybz/man-list-fixes
Update Makefile-man.am after recent changes and fix regeneration of Makefile-man.am
Fixes fallout from https://github.com/systemd/systemd/pull/282.
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 00:34:45 +0000 (20:34 -0400)]
man: update sysctl example about netfilter
It turns out that since kernel 3.18 netfilter on bridged packets
is off anyway, so the example should be reworded (and the module
name updated).
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 00:19:56 +0000 (20:19 -0400)]
man: information about available properties
https://bugzilla.redhat.com/show_bug.cgi?id=1144496
David Herrmann [Thu, 2 Jul 2015 10:14:27 +0000 (12:14 +0200)]
sd-bus: don't leak kdbus notifications
When we get notifications from the kernel, we always turn them into
synthetic dbus1 messages. This means, we do *not* consume the kdbus
message, and as such have to free the offset.
Right now, the translation-helpers told the caller that they consumed the
message, which is wrong. Fix this by explicitly releasing all kernel
messages that are translated.
Michael Marineau [Thu, 2 Jul 2015 06:46:42 +0000 (23:46 -0700)]
escape: fix exit code
r == 0 indicates success, not failure
Susant Sahani [Thu, 2 Jul 2015 03:30:02 +0000 (09:00 +0530)]
lldp: set correct state for processing
ldp_receive_frame after correct processing of the packet the state
should be LLDP_AGENT_RX_WAIT_FOR_FRAME not LLDP_AGENT_RX_UPDATE_INFO.
Daniel Mack [Wed, 1 Jul 2015 23:26:01 +0000 (19:26 -0400)]
Merge pull request #409 from teg/networkd-enslave-segfault
fix segfault when cancelling enslaving of links by netdevs
Daniel Mack [Wed, 1 Jul 2015 23:01:28 +0000 (19:01 -0400)]
Merge pull request #466 from rivanvx/master
timedatectl: trim non-local RTC warning to 80 chars wide
Vedran Miletić [Wed, 1 Jul 2015 22:13:31 +0000 (00:13 +0200)]
timedatectl: trim non-local RTC warning to 80 chars wide
Daniel Mack [Wed, 1 Jul 2015 20:52:02 +0000 (16:52 -0400)]
Merge pull request #459 from ctrochalakis/reuse-port-before-bind
socket: Set SO_REUSEPORT before bind()
Daniel Mack [Wed, 1 Jul 2015 17:45:33 +0000 (13:45 -0400)]
Merge pull request #419 from eworm-de/man-protecthome
man: ProtectHome= protects /root as well
Daniel Mack [Wed, 1 Jul 2015 17:42:16 +0000 (13:42 -0400)]
Merge pull request #463 from dvdhrm/udev-run
udev: destroy manager before cleaning environment
David Herrmann [Wed, 1 Jul 2015 17:25:30 +0000 (19:25 +0200)]
udev: destroy manager before cleaning environment
Due to our _cleanup_ usage for the udev manager, it will be destroyed
after the "exit:" label has finished. Therefore, it is the last
destruction done in main(). This has two side-effects:
- mac_selinux is destroyed before the udev manager is, possible causing
use-after-free if the manager-cleanup accesses selinux data
- log_close() is called *before* the manager is destroyed, possibly
re-opening the log if you use --debug (and thus not re-applying the
--debug option)
Avoid this by moving the manager-handling into a new function called
run(). This function will be left before we enter the "exit:" label in
main(), hence, the manager object will be destroyed early.
Kay Sievers [Wed, 1 Jul 2015 17:20:59 +0000 (19:20 +0200)]
udevd: force --debug mode to stderr
https://github.com/systemd/systemd/issues/462
David Herrmann [Wed, 1 Jul 2015 16:31:18 +0000 (18:31 +0200)]
bus-proxy: never apply policy when sending signals
Unlike dbus-daemon, the bus-proxy does not know the receiver of a
broadcast (as the kernel has exclusive access on the bus connections).
Hence, and "destination=" matches in dbus1 policies cannot be applied.
But kdbus does not place any restrictions on *SENDING* broadcasts, anyway.
The kernel never returns EPERM to KDBUS_CMD_SEND if KDBUS_MSG_SIGNAL is
set. Instead, receiver policies are checked. Hence, stop checking sender
policies for signals in bus-proxy and leave it up to the kernel.
This fixes some network-manager bus-proxy issues where NM uses weird
dst-based matches against interface-based matches. As we cannot perform
dst-based matches, our bus-proxy cannot properly implement this policy.
David Herrmann [Wed, 1 Jul 2015 13:05:01 +0000 (15:05 +0200)]
login: re-use VT-sessions if they already exist
Right now, if you start a session via 'su' or 'sudo' from within a
session, we make sure to re-use the existing session instead of creating a
new one. We detect this by reading the session of the requesting PID.
However, with gnome-terminal running as a busname-unit, and as such
running outside the session of the user, this will no longer work.
Therefore, this patch makes sure to return the existing session of a VT if
you start a new one.
This has the side-effect, that you will re-use a session which your PID is
not part of. This works fine, but will break assumptions if the parent
session dies (and as such close your session even though you think you're
part of it). However, this should be perfectly fine. If you run multiple
logins on the same session, you should really know what you're doing. The
current way of silently accepting it but choosing the last registered
session is just weird.
Daniel Mack [Wed, 1 Jul 2015 14:34:40 +0000 (10:34 -0400)]
Merge pull request #460 from xnox/bootchart-warning
bootchart: do not report warning when disk is missing model.
Dimitri John Ledkov [Wed, 1 Jul 2015 13:49:15 +0000 (14:49 +0100)]
bootchart: do not report warning when disk is missing model.
In VMs / virtio drives there is no model. Also don't print "Disk:
(null)" in output if no model is available.
Christos Trochalakis [Wed, 1 Jul 2015 11:39:53 +0000 (14:39 +0300)]
socket: Set SO_REUSEPORT before bind()
bind() fails if it is called before setting SO_REUSEPORT and another
process is already binded to the same addess.
A new reuse_port option has been introduced to socket_address_listen()
to set the option as part of socket initialization.
David Herrmann [Wed, 1 Jul 2015 11:02:58 +0000 (13:02 +0200)]
sysv-generator: fix coding-style
Fix weird coding-style:
- proper white-space
- no if (func() >= 0) bail-outs
- fix braces
- avoid 'r' for anything but errno
- init _cleanup_ variables unconditionally, even if not needed
David Herrmann [Wed, 1 Jul 2015 10:54:58 +0000 (12:54 +0200)]
Revert "kmod-setup: don't print warning on -ENOSYS"
This partially reverts commit
78d298bbc57e412574ea35e6e66f562d97fd9ebc.
The changed coding-style is kept, but the ENOENT->ENOSYS conversion is
reverted.
kmod was fixed upstream to no longer return ENOSYS. Also see:
https://git.kernel.org/cgit/utils/kernel/kmod/kmod.git/commit/?id=
114ec87c85c35a2bd3682f9f891e494127be6fb5
The kmod fix is marked for backport, so no reason to bump the kmod
version we depend on.
Martin Pitt [Wed, 1 Jul 2015 05:34:23 +0000 (07:34 +0200)]
sysv-generator test: Fix random ordering failure
test_simple_escaped() sometimes fails with
AssertionError: Lists differ: ['foo\\x2b.service', 'foo-admin.service'] != ['foo-admin.service', 'foo\\x2b.service']
We don't need to assume any order here, so compare them as a set, not a list.
Kay Sievers [Tue, 30 Jun 2015 20:32:45 +0000 (22:32 +0200)]
Merge pull request #411 from teg/udev-simplify-exec-envp
udev: event - simplify udev_event_spawn() logic
David Herrmann [Tue, 30 Jun 2015 20:15:55 +0000 (22:15 +0200)]
Merge pull request #398 from teg/netlink-container-rework
netlink container rework
Allocate containers as separate structs instead of individual arrays for each member field.
Martin Pitt [Tue, 30 Jun 2015 18:33:15 +0000 (20:33 +0200)]
Merge pull request #434 from kaysievers/wip
udev: remove WAIT_FOR key
Kay Sievers [Tue, 30 Jun 2015 17:54:37 +0000 (19:54 +0200)]
udev: remove WAIT_FOR key
This facility was never a proper solution, but only papered over
real bugs in the kernel. There are no known sysfs "timing bugs"
since a long time.
Christian Hesse [Tue, 30 Jun 2015 17:12:20 +0000 (19:12 +0200)]
man: ProtectHome= protects /root as well
Tom Gundersen [Tue, 30 Jun 2015 16:39:39 +0000 (18:39 +0200)]
Merge pull request #430 from gmacario/fix-issue404-v2
bootchart: Ensure that /proc/schedstat is read entirely (v2)
Tom Gundersen [Tue, 30 Jun 2015 16:24:14 +0000 (18:24 +0200)]
Merge pull request #429 from richardmaw-codethink/nspawn-userns-uid-shift-autodetection-fix
nspawn: determine_uid_shift before forking
Tom Gundersen [Tue, 30 Jun 2015 16:16:02 +0000 (18:16 +0200)]
Merge pull request #428 from richardmaw-codethink/nspawn-userns-remount-fail
nspawn: Don't remount with fewer options
Gianpaolo Macario [Tue, 30 Jun 2015 15:09:02 +0000 (15:09 +0000)]
bootchart: Ensure that /proc/schedstat is read entirely
On multi-core systems file /proc/schedstat may be
larger than 4096 bytes and pread() will only read part of it.
Fix issue https://github.com/systemd/systemd/issues/404
Lennart Poettering [Tue, 30 Jun 2015 14:58:35 +0000 (10:58 -0400)]
Merge pull request #424 from endocode/iaguis/shutdown-log-null
core: handle --log-target=null when calling systemd-shutdown
Richard Maw [Tue, 30 Jun 2015 13:41:41 +0000 (13:41 +0000)]
nspawn: determine_uid_shift before forking
It is needed in one branch of the fork, but calculated in another
branch.
Failing to do this means using --private-users without specifying a uid
shift always fails because it tries to shift the uid to UID_INVALID.
Richard Maw [Tue, 30 Jun 2015 13:21:14 +0000 (13:21 +0000)]
nspawn: Don't remount with fewer options
When we do a MS_BIND mount, it inherits the flags of its parent mount.
When we do a remount, it sets the flags to exactly what is specified.
If we are in a user namespace then these mount points have their flags
locked, so you can't reduce the protection.
As a consequence, the default setup of mount_all doesn't work with user
namespaces. However if we ensure we add the mount flags of the parent
mount when remounting, then we aren't removing mount options, so we
aren't trying to unlock an option that we aren't allowed to.
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 13:56:44 +0000 (09:56 -0400)]
build-sys: use wildcard glob in update-man-list again
The idea is that after adding a new man page, make update-man-list
will be used to regenerate part of the makefile. So the data already
present in the makefile cannot be used to do that.
Also, renames filter out generated xml files in make-man-rules.py
itself in order to make Makefile.am a bit simpler, and rename files
to dist_files to better reflect new meaning.
Zbigniew Jędrzejewski-Szmek [Tue, 30 Jun 2015 13:29:48 +0000 (09:29 -0400)]
build-sys: update Makefile-man
Follow up for
e6de49abfd28098c65b8a0be05bb84cf6cf780ae.
Iago López Galeiras [Tue, 30 Jun 2015 13:08:49 +0000 (15:08 +0200)]
core: handle --log-target=null when calling systemd-shutdown
When shutting down, if systemd was started with --log-target=null,
systemd-shutdown was being called with --log-target=console.
Tom Gundersen [Mon, 29 Jun 2015 21:30:14 +0000 (23:30 +0200)]
Merge pull request #412 from fsateler/sysv-invalid-names-v2
sysv-generator: detect invalid names and escape them V2
Daniel Mack [Mon, 29 Jun 2015 20:23:25 +0000 (22:23 +0200)]
Merge pull request #413 from jaystrictor/manpages
man: remove repeated word "the" and polish
Jay Strict [Mon, 29 Jun 2015 19:20:02 +0000 (21:20 +0200)]
man: remove repeated word "the" and polish
Felipe Sateler [Sun, 28 Jun 2015 00:00:32 +0000 (21:00 -0300)]
sysv-generator: escape names when translating from sysv name
While the LSB suggests only [A-Za-z0-9], that doesn't prevent admins
from doing the wrong thing. Lets not generate invalid names in
that case.
Felipe Sateler [Sun, 28 Jun 2015 00:02:53 +0000 (21:02 -0300)]
sysv-generator: detect invalid provided unit names
Do not assume that a non-service unit type is a target.
Daniel Mack [Mon, 29 Jun 2015 18:02:14 +0000 (20:02 +0200)]
Merge pull request #410 from teg/docs-gitignore
docs: remove stale .gitignore
Tom Gundersen [Sun, 28 Jun 2015 21:42:52 +0000 (23:42 +0200)]
udev: event - simplify udev_event_spawn() logic
Push the extraction of the envp + argv as close as possible to their use, to avoid code
duplication. As a sideeffect fix logging when delaing execution.
Tom Gundersen [Mon, 29 Jun 2015 17:45:10 +0000 (19:45 +0200)]
docs: remove stale .gitignore
This is no longer useful as the udev docs are gone.
Daniel Mack [Mon, 29 Jun 2015 16:58:19 +0000 (18:58 +0200)]
Merge pull request #408 from ColdPie1/fix_resp
man: Remove instances of pseudo-English "resp."
Andrew Eikum [Fri, 26 Jun 2015 16:02:00 +0000 (11:02 -0500)]
man: Remove instances of pseudo-English "resp."
Me again :) Just noticed one of these in a manpage and did another pass
to clean them up. See
16dad32e437fdf2ffca03cc60a083d84bd31886f for
explanation, though the link needs updating:
<http://transblawg.eu/2004/02/26/resp-and-other-non-existent-english-wordsnicht-existente-englische-worter/>
Tom Gundersen [Mon, 29 Jun 2015 14:02:33 +0000 (16:02 +0200)]
Merge pull request #387 from kaysievers/wip
udev: Remove accelerometer helper
Tom Gundersen [Mon, 29 Jun 2015 12:24:40 +0000 (14:24 +0200)]
networkd: netdev - avoid hanging transactions in failure cases
If a link is attempted t obe enslaved by a netdev that has already failed, we
must fail immediately and not save the callback for later, as it will then
never get triggered.
Tom Gundersen [Mon, 29 Jun 2015 12:23:17 +0000 (14:23 +0200)]
networkd: fix segfault when cancelling callbacks
This only happens when something has gone wrong, so is not easy to hit. However,
if a bridge (say) is configured on a system without bridge support we will hit
this.
Fixes issue #299.
Kay Sievers [Mon, 29 Jun 2015 08:59:35 +0000 (10:59 +0200)]
Merge pull request #403 from cedricde/patch-1
Process persistent storage rules for cciss devices
Cédric Delmas [Mon, 29 Jun 2015 07:54:58 +0000 (09:54 +0200)]
Process cciss devices
Do not skip the persistent storage rules for cciss devices
Daniel Mack [Mon, 29 Jun 2015 03:43:26 +0000 (05:43 +0200)]
Merge pull request #402 from systemd-mailing-devs/
1435512180-3659-1-git-send-email-ebiggers3@gmail.com
util: fix incorrect escape sequence in string_is_safe()
Daniel Mack [Mon, 29 Jun 2015 03:03:38 +0000 (05:03 +0200)]
Merge pull request #399 from gmacario/fix-issue341-v2
bootchart: reset list_sample_data head before generating SVG
Tom Gundersen [Sun, 28 Jun 2015 21:10:46 +0000 (23:10 +0200)]
Merge pull request #388 from fsateler/doc-pidfile-removal
systemd.service.xml: document that systemd removes the PIDFile
Eric Biggers [Sun, 28 Jun 2015 17:23:00 +0000 (12:23 -0500)]
util: fix incorrect escape sequence in string_is_safe()