summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* man: fix some manvolnumAnita Zhang2020-07-1121-24/+24
|
* NEWS: grammar improvements (#16413)Clinton Roy2020-07-101-8/+8
|
* Added MSI Prestige15 A10SC specific keycodesFilippo Falezza2020-07-101-0/+5
| | | This commit enables the microphone mute button and the screen rotate button, even if the latter is improperly linked. I have documented how to achieve this in https://wiki.archlinux.org/index.php/MSI_P15#Fn_Keys .
* Add support for HP Elitebook x360 1040 G6 micmute buttonSurhud More2020-07-101-0/+2
|
* Explain how to determine hierarchy type from shellFlorian Mayer2020-07-101-0/+2
| | | This makes it easier for people than just recommending the syscall.
* install: fix wrong data typefangxiuning2020-07-102-2/+2
|
* NEWS: drop duplicate entry, add --image= entryLennart Poettering2020-07-101-9/+4
|
* NEWS: add datev246-rc1Zbigniew Jędrzejewski-Szmek2020-07-091-0/+2
|
* userdb: fix dlopen callZbigniew Jędrzejewski-Szmek2020-07-091-1/+1
| | | | | The call would always fail with: systemd-userwork[780]: Failed to dlopen(libnss_systemd.so.2), ignoring: /usr/lib64libnss_systemd.so.2: cannot open shared object file: No such file or directory
* Merge pull request #16411 from ddstreet/bridge_without_carrier_failsYu Watanabe2020-07-091-4/+2
|\ | | | | Bridge without carrier fails
| * test-netowrk: in test_bridge_configure_without_carrier, avoid strange test ↵Dan Streetman2020-07-081-3/+2
| | | | | | | | | | | | | | | | | | failures For some reason the wait-online is failing intermittently; it's unclear exactly why, but this hopefully avoids the failure for unrelated PR. This is a workaround (not fix) for #16105
| * test-network: don't print networkctl output for passing subtestsDan Streetman2020-07-081-1/+0
| | | | | | | | This just clutters up the logs.
* | NEWS: add blurb about os-release and $container_host_*Zbigniew Jędrzejewski-Szmek2020-07-091-0/+8
| |
* | Merge pull request #15891 from bluca/host_os_releaseZbigniew Jędrzejewski-Szmek2020-07-0813-84/+153
|\ \ | | | | | | Container Interface: expose the host's os-release metadata to nspawn and portable guests
| * | portabled: implement container host os-release interfaceLuca Boccassi2020-06-231-0/+1
| | |
| * | nspawn: implement container host os-release interfaceLuca Boccassi2020-06-237-15/+95
| | |
| * | Container interface: document exposing the host's os-releaseLuca Boccassi2020-06-232-0/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | In order to allow applications to detect the host OS version or other metadata, ask container managers to expose the os-release files as read-only bind mounts. For systemd-nspawn, we will also expose ID, BUILD_ID, VERSION_ID and VARIANT_ID as lowercase environment variables prefixed by the container_host_ string.
| * | nspawn: use mkdir_p_safe instead of homegrown versionLuca Boccassi2020-06-231-54/+2
| | |
| * | basic/mkdir: introduce safe recursive variantsLuca Boccassi2020-06-233-16/+39
| | | | | | | | | | | | Add mkdir_p_safe and mkdir_parents_safe. Will be used by nspawn.
* | | Merge pull request #16405 from sipraga/masterZbigniew Jędrzejewski-Szmek2020-07-088-2/+72
|\ \ \
| * | | network: add support for MACVLAN source modeAlvin Šipraga2020-07-088-2/+72
| | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add support for creating a MACVLAN interface in "source" mode by specifying Mode=source in the [MACVLAN] section of a .netdev file. A list of allowed MAC addresses for the corresponding MACVLAN can also be specified with the SourceMACAddress= option of the [MACVLAN] section. An example .netdev file: [NetDev] Name=macvlan0 Kind=macvlan MACAddress=02:DE:AD:BE:EF:00 [MACVLAN] Mode=source SourceMACAddress=02:AB:AB:AB:AB:01 02:CD:CD:CD:CD:01 SourceMACAddress=02:EF:EF:EF:EF:01 The same keys can also be specified in [MACVTAP] for MACVTAP kinds of interfaces, with the same semantics.
* | | Merge pull request #15955 from anitazha/nulloremptyZbigniew Jędrzejewski-Szmek2020-07-083-10/+41
|\ \ \ | | | | | | | | core: check null_or_empty_path for masked units instead of /dev/null
| * | | shared/install: do not require /dev/null to be present in chrootsZbigniew Jędrzejewski-Szmek2020-07-052-11/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This partially undoes the parent commit. We follow the symlink and if it appears to be a symlink to /dev/null, even if /dev/null is not present, we treat it as such. The addition of creation of /dev/null in the test is reverted.
| * | | core: check null_or_empty for masked units instead of /dev/nullAnita Zhang2020-07-033-10/+35
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There's some inconsistency in the what is considered a masked unit: some places (i.e. load-fragment.c) use `null_or_empty()` while others check if the file path is symlinked to "/dev/null". Since the latter doesn't account for things like non-absolute symlinks to "/dev/null", this commit switches the check for "/dev/null" to use `null_or_empty_path()`
* | | | Merge pull request #16404 from keszybz/release-246-prepZbigniew Jędrzejewski-Szmek2020-07-084-8/+43
|\ \ \ \ | | | | | | | | | | Prepare v246-rc1
| * | | | meson: bump version numbers for v246Zbigniew Jędrzejewski-Szmek2020-07-081-3/+3
| | | | |
| * | | | NEWS: update contributors list for v246-rcZbigniew Jędrzejewski-Szmek2020-07-082-1/+39
| | | | |
| * | | | git-contrib: simplify implementation a bitZbigniew Jędrzejewski-Szmek2020-07-081-4/+1
| | |/ / | |/| |
* | | | test: bump the TEST-47 sleeps once againFrantisek Sumsal2020-07-081-2/+2
|/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Several recent failed runs show that the test is still racy in two ways: 1) Sometimes it takes a while before the PID file is created, leading to: ``` [ 10.950540] testsuite-47.sh[308]: ++ cat /leakedtestpid [ 10.959712] testsuite-47.sh[308]: cat: /leakedtestpid: No such file or directory [ 10.959824] testsuite-47.sh[298]: + leaked_pid= ``` 2) Again, sometimes we check the leaked PID before the unit is actually stopped, leading to a false negative: ``` [ 18.099599] testsuite-47.sh[346]: ++ cat /leakedtestpid [ 18.116462] testsuite-47.sh[333]: + leaked_pid=342 [ 18.117101] testsuite-47.sh[333]: + systemctl stop testsuite-47-repro ... [ 20.033907] testsuite-47.sh[333]: + ps -p 342 [ 20.080050] testsuite-47.sh[351]: PID TTY TIME CMD [ 20.080050] testsuite-47.sh[351]: 342 ? 00:00:00 sleep [ 20.082040] testsuite-47.sh[333]: + exit 42 ```
* | | Merge pull request #16385 from JackFangXN/masterLennart Poettering2020-07-0814-29/+35
|\ \ \ | | | | | | | | table add table_log_xx_error()
| * | | table use table_log_print_error() instead of table_log_show_errorfangxiuning2020-07-0814-26/+26
| | | |
| * | | table add table_log_sort_error()fangxiuning2020-07-086-5/+8
| | | |
| * | | table add table_log_show_error()fangxiuning2020-07-0810-14/+17
| | | |
* | | | sd-device: use log_device_debug_errno()Yu Watanabe2020-07-081-1/+1
| | | |
* | | | Merge pull request #16379 from ↵Yu Watanabe2020-07-083-5/+27
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | yuwata/network-dhcp6-delegated-prefix-address-handler network: fix assertion in assigning dhcp6 delegated prefix
| * | | | network: make address_handler() staticYu Watanabe2020-07-072-2/+1
| | | | |
| * | | | network: introduce own address handler for dhcp6 delegated prefixYu Watanabe2020-07-071-3/+26
| | | | | | | | | | | | | | | | | | | | Fixes #16365.
* | | | | docs: update information where to file bugs against RHEL/CentOS versions of ↵Lukas Nykryn2020-07-071-1/+1
| | | | | | | | | | | | | | | | | | | | systemd
* | | | | Merge pull request #16143 from fbuihuu/fstab-generator-fixZbigniew Jędrzejewski-Szmek2020-07-072-31/+36
|\ \ \ \ \ | | | | | | | | | | | | fstab-generator: make sure explicit deps configured via mount options apply to .mount, not .automount unit
| * | | | | fstab-generator: introduce an helper to write extra dependencies specified ↵Franck Bui2020-07-011-14/+26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | via the mount options No functional change.
| * | | | | fstab-generator: extra dependencies specified in fstab should be applied to ↵Franck Bui2020-07-012-18/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the mount unit If an entry in fstab uses "x-systemd.automount" option and also asks for additionnal dependencies via x-systemd.requires or such, then the dependencies were applied to the automount unit. But this unlikely to do the right thing and is inconsistent with what's done for network mounts. Indeed when an fstab entries has "_netdev,x-systemd.automount" options, the dependencies against the network requested by "_netdev" are (correctly) applied to the mount unit only and the automount unit remains ordered against local-fs.target. The same logic should be followed when extra deps are specified via the mount options as automount units should always be ordered against local-fs.target. Note: in general explicit deps specified via mount options should be used with care and should be used to specify dependencies on other mount units only as it can easily create ordering cycles otherwise like it's been seen in https://github.com/systemd/systemd-stable/issues/69. Mount units (as well as automount ones) are ordered before local-fs.target by default which is a low-level target that most other units depend on.
* | | | | | add error message when bind mount src missingAlan Perry2020-07-072-5/+8
| | | | | |
* | | | | | Merge pull request #16301 from poettering/firstboot-imageZbigniew Jędrzejewski-Szmek2020-07-0710-27/+189
|\ \ \ \ \ \ | | | | | | | | | | | | | | Add --image= switch to firstboot, similar to --root= but with support for operating on disk image
| * | | | | | TODOLennart Poettering2020-07-071-2/+6
| | | | | | |
| * | | | | | firstboot: add option to turn off welcome text displayLennart Poettering2020-07-072-0/+23
| | | | | | |
| * | | | | | man: document the new --image= switch of systemd-firstbootLennart Poettering2020-07-071-0/+12
| | | | | | |
| * | | | | | firstboot: add --image= switchLennart Poettering2020-07-071-6/+108
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is like --root=, but takes an image file path or device node path and dissects the image directly, mounting it internally.
| * | | | | | mount-util: use UMOUNT_NOFOLLOW in recursive umounterLennart Poettering2020-07-071-3/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When we only want to unmount mount points below some path then it is against our interest to follow symlinks. Hence don't.
| * | | | | | mount-util: add destructor helper that umounts + rmdirs a pathLennart Poettering2020-07-071-0/+11
| | | | | | |
| * | | | | | namespace-util: introduce helper for combining unshare() + MS_SLAVE remountLennart Poettering2020-07-075-16/+27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We have multiple places we do these two non-trivial operations together, let's introduce a unified helper for doing both at once.