Yu Watanabe [Sat, 18 May 2019 01:31:37 +0000 (10:31 +0900)]
Merge pull request #12586 from ssahani/route-properties
Route properties
Susant Sahani [Thu, 16 May 2019 09:49:08 +0000 (15:19 +0530)]
networkd: route add MPLS TTL propagate
Yu Watanabe [Sat, 18 May 2019 01:25:59 +0000 (10:25 +0900)]
Merge pull request #12593 from AdrianBunk/master
Small changes from Yocto/musl builds
Susant Sahani [Thu, 16 May 2019 06:46:19 +0000 (12:16 +0530)]
networkd: FOU netdev add support to configure peer port
Zbigniew Jędrzejewski-Szmek [Fri, 17 May 2019 11:35:18 +0000 (13:35 +0200)]
shared/varlink: add missing setting of output_buffer_allocated
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14708,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14735,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14725,
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14720,
and probably others.
Susant Sahani [Thu, 16 May 2019 09:48:35 +0000 (15:18 +0530)]
sd-netlink: add route netlink properties
Martin Pitt [Thu, 16 May 2019 20:26:21 +0000 (22:26 +0200)]
semaphore: switch to Debian experimental packaging branch
Debian unstable is frozen for the Debian 9 release, current development
happens in experimental. After the release, this can be switched back to
master, and the branch set through the `$BRANCH` env variable in the
semaphore config.
Andrej Valek [Thu, 18 Apr 2019 08:47:11 +0000 (10:47 +0200)]
fs-util.h: add missing sys/stat include
fix error:
| error: passing argument 5 of 'chase_symlinks_and_stat' from incompatible pointer type [-Werror=incompatible-pointer-types]
Adrian Bunk [Thu, 16 May 2019 19:20:07 +0000 (22:20 +0300)]
Replace the legacy ULONG_LONG_MAX with the C99 ULLONG_MAX
Chen Qi [Mon, 25 Feb 2019 08:37:19 +0000 (16:37 +0800)]
socket-util.h: include string.h
Fix the following compile error:
src/basic/socket-util.h:187:30: error: implicit declaration of function 'strnlen'; did you mean 'strlen'? [-Werror=implicit-function-declaration]
Adrian Bunk [Thu, 16 May 2019 19:09:46 +0000 (22:09 +0300)]
src/udev/udev-event.c must #include <sys/wait.h>
Fixes the following build failure with musl:
../git/src/udev/udev-event.c: In function 'spawn_wait':
../git/src/udev/udev-event.c:600:53: error: 'WEXITED' undeclared (first use in this function); did you mean 'WIFEXITED'?
r = sd_event_add_child(e, NULL, spawn->pid, WEXITED, on_spawn_sigchld, spawn);
^~~~~~~
This looks like a bug in udev-event.c that could also have broken
the compilation after some future glibc header reshuffle.
Michael Biebl [Fri, 17 May 2019 06:02:46 +0000 (08:02 +0200)]
meson: stop creating .wants directories for {multi-user,getty}.target (#12569)
Since preset is supposed to be used to enable the services, there is no
need to pre-create those directories either.
Follow-up for #12164
Franck Bui [Mon, 6 May 2019 13:49:23 +0000 (15:49 +0200)]
udevd: change the default value of udev.children-max (again)
Follow-up for
faae64fa3dc22738b3af669579a33055b9d71432, which increased the
default number of udev workers per cpu regardless of how big the system is.
It's not really clear from the commit message if the new number of workers
improved the overall time for the boot process or only reduced the number of
times the max number of children limit was reached (and in this case
5406c36844b3 commit might have been more appropriate in the first place).
But systems with ~1000 CPUs are not rare these days and the worker numbers get
quite large with CPU factor of 8. Spawning more than 2000 workers can't be
healthy on any system, no matter how big.
Indeed the main mistake is the belief that udev is CPU-intensive, and thus the
number of allowed workers has to increase with the number of CPUs. It is not,
at probably has never been. It's I/O bound, and sometimes, bound by resources
such as locks.
This is an argument to:
- scale only weakly with the number of CPUs, and the rationale to switch back
to a scale factor C=2 but with a higher offset number which should affect
systems with a small number of CPUs only. With this patch applied the offset
is increased from O=8 to O=16.
- put an absolute maximum limit to make sure no more than 2048 workers are
spawned no matter how big the system is.
This still provides more workers for the laptop cases (where the number of CPUs
is limited), while avoiding sky-rocketing numbers for big systems.
Note that on most desktop systems, the memory limit will kick in. The following
table collects numbers about children-max. For each scenario, the first column
is the "cpu_limit" limit, and the second number is the minimum amount of memory
for the "cpu_limit" limit to become relevant (with less RAM, memory will limit
the number of children thus "mem_limit" will become the active limit).
| > v240 | < v240 | this patch |
CPUs | C = 8, O = 8 | C = 2, O = 8 | C = 2, O = 16 |
-------------------------------------------------------
1 | 16 2 | 10 1.3 | 18 2 |
2 | 24 3 | 12 1.5 | 20 2 |
4 | 40 5 | 16 2 | 24 3 |
8 | 72 9 | 24 3 | 32 4 |
16 | 136 17 | 40 5 | 48 5 |
64 | 520 65 | 136 17 | 144 18 |
1024 | 8200 1025 | 2056 263 | 2048 256 |
2048 |16392 2049 | 4104 513 | 2048 256 |
This patch is mainly based on Martin Wilck's analyze and comments.
Zbigniew Jędrzejewski-Szmek [Thu, 16 May 2019 21:04:45 +0000 (23:04 +0200)]
Merge pull request #12515 from evverx/fix-fuzzers-in-local-mode
travis: make sure the fuzzers can be built in "local" mode
Zbigniew Jędrzejewski-Szmek [Thu, 16 May 2019 19:15:06 +0000 (21:15 +0200)]
Merge pull request #12535 from poettering/color-grey
redefine how we select the ANSI color grey
Lennart Poettering [Mon, 13 May 2019 13:23:47 +0000 (15:23 +0200)]
docs: add comment about high 32bit range and signed uids
Lennart Poettering [Tue, 14 May 2019 13:11:40 +0000 (15:11 +0200)]
random-util: add a longer comment explaining our RDRAND use
Evgeny Vereshchagin [Thu, 16 May 2019 15:53:57 +0000 (17:53 +0200)]
tests: make docker-run and helper.py happy by not using colons in filenames
This should address https://github.com/google/oss-fuzz/issues/2428
Frantisek Sumsal [Wed, 15 May 2019 17:28:09 +0000 (19:28 +0200)]
journalctl: return a non-zero EC when --grep returns no matches
When journalctl is compiled with PCRE2 support, let's return a non-zero
exit code when --grep is used and no match for given pattern is found.
This should allow users to use journalctl --grep in scripts instead of
piping journalctl into grep
Fixes #8152
Yu Watanabe [Thu, 16 May 2019 03:35:10 +0000 (12:35 +0900)]
varlink: initialize Varlink with 0
Closes oss-fuzz#14688.
Lennart Poettering [Thu, 16 May 2019 14:39:38 +0000 (16:39 +0200)]
Merge pull request #12378 from rbalint/vt-kbd-reset-check
VT kbd reset check
Yu Watanabe [Thu, 16 May 2019 06:25:48 +0000 (08:25 +0200)]
Merge pull request #12574 from yuwata/network-mtu-issue-12552
network: do not always bump MTU with additional 4bytes
Yu Watanabe [Sun, 12 May 2019 20:40:31 +0000 (05:40 +0900)]
network: do not use ordered_set_printf() for DOMAINS= or ROUTE_DOMAINS=
This partially reverts
5e2a51d588dde4b52c6017ea80b75c16e6e23431.
Fixes #12531.
Yu Watanabe [Thu, 16 May 2019 03:11:05 +0000 (05:11 +0200)]
Merge pull request #12549 from yuwata/network-sittun-disable-link-local-addressing-12547
network: disable LinkLocalAddressing on sit devices
Yu Watanabe [Thu, 16 May 2019 03:10:35 +0000 (05:10 +0200)]
Merge pull request #12576 from ssahani/fou
networkd: FOU tunnel support Local and Peer tunnel addresses
Yu Watanabe [Thu, 16 May 2019 03:01:35 +0000 (05:01 +0200)]
Merge pull request #12578 from ssahani/ipvtap
networkd: introduce netdev ipvtap
Yu Watanabe [Thu, 16 May 2019 02:49:13 +0000 (11:49 +0900)]
test-network: adjust mtu
Yu Watanabe [Thu, 16 May 2019 02:42:46 +0000 (11:42 +0900)]
network: bump MTU bytes only when MTUByte= is not set
Yu Watanabe [Wed, 15 May 2019 07:02:06 +0000 (16:02 +0900)]
network: honor MTUBytes= setting
Closes #12552.
Yu Watanabe [Sun, 12 May 2019 21:55:16 +0000 (06:55 +0900)]
test-network: check tunnel netdevs become operstate 'routable'
Susant Sahani [Wed, 15 May 2019 09:17:18 +0000 (14:47 +0530)]
networkd: FOU tunnel support Local and Peer tunnel addresses
Susant Sahani [Wed, 15 May 2019 09:16:01 +0000 (14:46 +0530)]
sd-netlink: Add Fou properties FOU_ATTR_LOCAL_V4/FOU_ATTR_PEER_V4
FOU_ATTR_LOCAL_V6
FOU_ATTR_PEER_V6
FOU_ATTR_PEER_PORT
FOU_ATTR_IFINDEX
Yu Watanabe [Thu, 16 May 2019 01:19:08 +0000 (10:19 +0900)]
linux: update headers from current kernel master
Yu Watanabe [Thu, 16 May 2019 00:48:34 +0000 (09:48 +0900)]
test-network: add a basic test for ipvtap
Susant Sahani [Wed, 15 May 2019 10:12:30 +0000 (15:42 +0530)]
networkd: introduce netdev ipvtap
This patch adds netdev ipvtap that is based on the
IP-VLAN network interface, called ipvtap. An ipvtap device can be created
in the same way as an ipvlan device, using 'kind ipvtap', and then accessed
using the tap user space interface.
Yu Watanabe [Sun, 12 May 2019 21:51:54 +0000 (06:51 +0900)]
network: disable link local addressing on ipip, gre, sit, and vti netdevs
Closes #12547.
Yu Watanabe [Wed, 15 May 2019 04:15:16 +0000 (13:15 +0900)]
wait-online: ignore -ENODATA on updating link information
When netdev is not created yet, the -ENODATA is returned.
Yu Watanabe [Sun, 12 May 2019 21:48:31 +0000 (06:48 +0900)]
network: link_check_ready() returns earlier if routes are not configured yet
link_request_set_routes() calls link_check_ready(), so it is not
necessary to continue that here.
Yu Watanabe [Wed, 15 May 2019 20:46:25 +0000 (22:46 +0200)]
Merge pull request #12496 from yuwata/network-on-device-default-route
network: add DefaultRouteOnDevice= setting in [Network] section
Balint Reczey [Wed, 24 Apr 2019 15:24:02 +0000 (17:24 +0200)]
Add check to switch VTs only between K_XLATE or K_UNICODE
Switching to K_UNICODE from other than L_XLATE can make the keyboard
unusable and possibly leak keypresses from X.
BugLink: https://launchpad.net/bugs/1803993
Yu Watanabe [Wed, 15 May 2019 08:49:15 +0000 (17:49 +0900)]
analyze: fix help message
Jan Synacek [Tue, 14 May 2019 08:45:08 +0000 (10:45 +0200)]
man: note that journal does not validate syslog fields
Lennart Poettering [Wed, 15 May 2019 08:50:03 +0000 (10:50 +0200)]
Merge pull request #12565 from zachsmith/fix-log-message-typos
systemd-sleep: Fix typos in log messages
Thadeu Lima de Souza Cascardo [Mon, 13 May 2019 19:58:01 +0000 (16:58 -0300)]
ask-password: prevent buffer overrow when reading from keyring
When we read from keyring, a temporary buffer is allocated in order to
determine the size needed for the entire data. However, when zeroing that area,
we use the data size returned by the read instead of the lesser size allocate
for the buffer.
That will cause memory corruption that causes systemd-cryptsetup to crash
either when a single large password is used or when multiple passwords have
already been pushed to the keyring.
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Yu Watanabe [Wed, 15 May 2019 03:43:36 +0000 (12:43 +0900)]
test-network: add a test for IPv4LLRoute=
Yu Watanabe [Tue, 7 May 2019 04:18:30 +0000 (06:18 +0200)]
test-network: add tests for DefaultRouteOnDevice=
Yu Watanabe [Tue, 14 May 2019 07:43:14 +0000 (16:43 +0900)]
network: add DefaultRouteOnDevice= setting in [Network] section
When enabled, then default route bound to the interface will be created.
This is useful when adding routes on point-to-point interfaces.
Closes #788.
Yu Watanabe [Tue, 14 May 2019 08:58:20 +0000 (17:58 +0900)]
network: add missing error check
Susant Sahani [Tue, 14 May 2019 09:45:23 +0000 (11:45 +0200)]
networkd: do not generate MAC for bridge device.
closes https://github.com/systemd/systemd/issues/12558
Zach Smith [Tue, 14 May 2019 04:02:06 +0000 (21:02 -0700)]
fix typo in partition device message
Frantisek Sumsal [Tue, 14 May 2019 12:19:41 +0000 (14:19 +0200)]
Merge pull request #12562 from evverx/timeouts
tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly
Evgeny Vereshchagin [Tue, 14 May 2019 11:47:56 +0000 (13:47 +0200)]
tests: make fuzzbuzz.sh compatible with Azure Pipelines again
Now that https://github.com/systemd/systemd/pull/12542 is merged,
fuzzbuzz.sh should be changed a little bit to make it work
on Azure Pipelines. We can no longer assume that source repositories
are added "automagically" by Travis CI or that PATH is set properly.
Evgeny Vereshchagin [Thu, 9 May 2019 16:21:38 +0000 (18:21 +0200)]
README: bring the coverity badge back
This reverts commit
bf0e551c176fc7aec6b3413d3b311f3e6610df65.
Evgeny Vereshchagin [Wed, 8 May 2019 22:03:41 +0000 (00:03 +0200)]
fuzzers: use -fsanitizer=fuzzer if clang supports it
Closes https://github.com/systemd/systemd/issues/10645
Evgeny Vereshchagin [Wed, 8 May 2019 21:23:55 +0000 (23:23 +0200)]
travis: make sure the fuzzers can be built in "local" mode
Evgeny Vereshchagin [Tue, 14 May 2019 11:13:04 +0000 (13:13 +0200)]
tests: turn on the QEMU part in the Xenial job
The test has been flaky since varlink was merged.
Let's not annoy people with the test that fails more often than not.
It should be OK because the same test is run on Arch.
Evgeny Vereshchagin [Tue, 14 May 2019 11:04:42 +0000 (13:04 +0200)]
tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly
These were never set explictily because we relied on Travis CI
canceling a job if it's been stuck for 10 minutes. Now that
the script is run on Azure Pipelines (where the default timeout
is 60 minutes) we should limit the script manually to avoid waiting
for an hour for broken jobs to finish.
Evgeny Vereshchagin [Tue, 14 May 2019 10:49:54 +0000 (13:49 +0300)]
Merge pull request #12542 from evverx/TEST-PIPELINE
move the FuzzBuzz stage to Azure Pipelines
Michael Biebl [Tue, 14 May 2019 10:29:41 +0000 (12:29 +0200)]
Merge pull request #12536 from poettering/rdrand-workaround-on-amd
random-util: eat up bad RDRAND values seen on AMD CPUs
Evgeny Vereshchagin [Tue, 14 May 2019 10:07:41 +0000 (12:07 +0200)]
README: yet another badge. with the status of Pipelines this time.
Evgeny Vereshchagin [Mon, 13 May 2019 00:09:14 +0000 (02:09 +0200)]
tests: move the FuzzBuzz stage from Travis CI to Azure Pipelines
Evgeny Vereshchagin [Sun, 12 May 2019 03:57:10 +0000 (05:57 +0200)]
tests: make fuzzbuzz.sh compatible with Azure Piplines
Evgeny Vereshchagin [Sun, 12 May 2019 03:54:25 +0000 (05:54 +0200)]
tests: try to run fuzzbuzz.sh with Azure Pipelines to see how it fares there
Yu Watanabe [Tue, 14 May 2019 07:03:52 +0000 (09:03 +0200)]
Merge pull request #12555 from ssahani/route-properties
networkd: route add support to configure fastopen_no_cookie
Susant Sahani [Mon, 13 May 2019 14:30:28 +0000 (20:00 +0530)]
networkd: DHCP client add support to send RELEASE packet
closes #10820
Zach Smith [Tue, 14 May 2019 03:01:36 +0000 (20:01 -0700)]
fix typo in wakealarm message
Susant Sahani [Tue, 14 May 2019 02:39:54 +0000 (08:09 +0530)]
networkd: route fix coding style
Susant Sahani [Mon, 13 May 2019 11:15:33 +0000 (16:45 +0530)]
networkd: route add support to configure fastopen_no_cookie
This patch adds fastopen_no_cookie option to enable/disable TCP fastopen
without a cookie on a per-route basis.
Susant Sahani [Wed, 8 May 2019 14:13:21 +0000 (19:43 +0530)]
networkd: bridge FDB support more NTF_* flags
Add support to configure NTF_ROUTER and NTF_USE
Yu Watanabe [Tue, 14 May 2019 00:22:18 +0000 (02:22 +0200)]
Merge pull request #12537 from yuwata/network-link-local-follow-ups
network: do not send ipv6 token to kernel
Frantisek Sumsal [Mon, 13 May 2019 18:39:02 +0000 (20:39 +0200)]
travis: move the Xenial phase to Azure Pipelines
Xi Ruoyao [Sun, 12 May 2019 06:22:11 +0000 (14:22 +0800)]
tmpfiles: do not create /run/nologin if PAM is disabled
If systemd is not built with PAM support, systemd-user-sessions.service
won't be built. On systems without PAM, /run/nologin is useless. On
systems with PAM but systemd is not built with PAM, /run/nologin won't
be removed and all unprivileged users can't login.
So, we should not create /run/nologin if systemd is built without PAM.
Simon Schricker [Mon, 13 May 2019 08:47:43 +0000 (10:47 +0200)]
man: mention garbage collection of failed conditions
See discussion:
https://github.com/systemd/systemd/issues/2234
Susant Sahani [Mon, 13 May 2019 11:14:55 +0000 (16:44 +0530)]
sd-netlink: support RTAX_FASTOPEN_NO_COOKIE
Lennart Poettering [Mon, 13 May 2019 08:47:07 +0000 (10:47 +0200)]
Merge pull request #12546 from jwrdegoede/hwdb-logitech-s510
Hwdb logitech s510
Hans de Goede [Sun, 12 May 2019 10:25:39 +0000 (12:25 +0200)]
hwdb: Add key mappings for Logitech S510 keyboard and remote control
The S510 keyboard and S510 remote control both have 1 key where the markings
on the key dop not match with the generic Logitech 27MHz keymap.
This commit adds device specific overrides for this.
Hans de Goede [Sun, 12 May 2019 10:21:33 +0000 (12:21 +0200)]
hwdb: Update generic Logitech 27 MHz keyboard key mappings
This commit makes 2 changes to the generic Logitech 27 MHz keyboard keymap:
1. It moves some codes from being keyboard specific to the generic 27MHz
mapping table, these codes do not conflict on different models and at
least the c1019 - c101b codes are not only used on the MX3000 keyboard,
but also on the S510 Remote control
2. Add a bunch of new codes found on the S510 keyboard and S510 remote control
Evgeny Vereshchagin [Sun, 12 May 2019 02:17:16 +0000 (05:17 +0300)]
Merge pull request #12524 from evverx/UBSan-reports
tests: stop sending UBsan reports to /dev/null
Evgeny Vereshchagin [Sun, 12 May 2019 02:04:29 +0000 (04:04 +0200)]
tests: hook up the repository to Azure Pipelines
The idea is to move a couple of stages from Travis CI (which has been
overloaded since I added the "FuzzBuzz" stage) to Azure Pipelines.
Evgeny Vereshchagin [Sun, 12 May 2019 01:45:29 +0000 (03:45 +0200)]
travis: make the ASan+UBSan stage compatible with Azure Pipelines
Evgeny Vereshchagin [Fri, 10 May 2019 16:33:35 +0000 (18:33 +0200)]
tests: override a hard-coded timeout that kicks in too early (under ASan+UBSan)
The test has failed two times today: https://travis-ci.org/systemd/systemd/jobs/
530750626
and https://travis-ci.org/systemd/systemd/jobs/
530759465.
Evgeny Vereshchagin [Fri, 10 May 2019 00:47:03 +0000 (02:47 +0200)]
tests: redirect the stdout/stderr of journald to a file (under ASan+UBSan)
Sometimes UBSan sends its reports to stderr regardless of what is specified in log_path
Let's try to catch them by redirecting stderr (and stdout just in case) to a file
See https://github.com/systemd/systemd/pull/12524#issuecomment-
491108821
Evgeny Vereshchagin [Thu, 9 May 2019 23:00:29 +0000 (01:00 +0200)]
tests: redirect UBsan reports to a file
so that they won't end up in /dev/null
Yu Watanabe [Sat, 11 May 2019 22:51:23 +0000 (00:51 +0200)]
Merge pull request #12516 from yuwata/network-split-link
networkd: split networkd-link.c
Susant Sahani [Sat, 11 May 2019 02:38:57 +0000 (08:08 +0530)]
networkd: Geneve add support for inherit for TTL
Yu Watanabe [Sat, 11 May 2019 22:34:13 +0000 (07:34 +0900)]
test-network: add a tiny test for IPv6Token=
Yu Watanabe [Thu, 9 May 2019 05:39:46 +0000 (14:39 +0900)]
network: do not send ipv6 token to kernel
We disabled kernel RA support. Then, we should not send
IFLA_INET6_TOKEN.
Thus, we do not need to send IFLA_INET6_ADDR_GEN_MODE twice.
Follow-up for
0e2fdb83bb5e22047e0c7cc058b415d0e93f02cf and
4eb086a38712ea98faf41e075b84555b11b54362.
Yu Watanabe [Fri, 10 May 2019 15:02:58 +0000 (00:02 +0900)]
network: move MulticastRouter to netdev/bridge.[ch]
Yu Watanabe [Fri, 10 May 2019 14:31:20 +0000 (23:31 +0900)]
network: drop unnecessary initializations
Yu Watanabe [Fri, 10 May 2019 14:29:07 +0000 (23:29 +0900)]
network: move link_set_bond() to netdev/bond.c
Yu Watanabe [Fri, 10 May 2019 14:22:47 +0000 (23:22 +0900)]
network: move link_set_bridge to netdev/bridge.c
Yu Watanabe [Thu, 9 May 2019 06:39:19 +0000 (15:39 +0900)]
network: move CAN link related functions to networkd-can.c
Yu Watanabe [Fri, 10 May 2019 21:21:40 +0000 (06:21 +0900)]
network: make BindCarrier= work with CAN devices
If CAN device is set `BindCarrier=` then the interface could not be
down. This fixes the issue.
Yu Watanabe [Thu, 9 May 2019 06:53:01 +0000 (15:53 +0900)]
network: make link_drop() can take custom handler
It will be used in the later commit.
Yu Watanabe [Thu, 9 May 2019 05:21:55 +0000 (07:21 +0200)]
network: move sd_lldp related functions to networkd-lldp-rx.c
Susant Sahani [Fri, 10 May 2019 12:17:45 +0000 (17:47 +0530)]
LLDP: Fix logs for LLDP
```
May 10 11:08:54 test systemd-networkd[447]: wwan0: Failed to stop LLDP: Success
May 10 11:08:54 test systemd-networkd[447]: wwan0: Gained carrier
May 10 11:08:54 test systemd-networkd[447]: wwan0: Failed to start LLDP: Success
```
Yu Watanabe [Thu, 9 May 2019 05:21:06 +0000 (07:21 +0200)]
network: move link_lldp_emit_enabled() to networkd-lldp-tx.c
Lennart Poettering [Fri, 10 May 2019 19:16:16 +0000 (15:16 -0400)]
random-util: eat up bad RDRAND values seen on AMD CPUs
An ugly, ugly work-around for #11810. And no, we shouldn't have to do
this. This is something for AMD, the firmware or the kernel to
fix/work-around, not us. But nonetheless, this should do it for now.
Fixes: #11810
Lennart Poettering [Fri, 10 May 2019 19:14:59 +0000 (15:14 -0400)]
Merge pull request #12518 from keszybz/naming-scheme
Document our naming schemes properly
Lennart Poettering [Fri, 10 May 2019 18:58:23 +0000 (14:58 -0400)]
journalctl: don't output ANSI sequences if disabled