summaryrefslogtreecommitdiff
path: root/src/network/netdev
Commit message (Collapse)AuthorAgeFilesLines
* networkd: correct batman-adv setting name (GatewayBandwidth) (#19539)Jörg Deckert2021-05-081-0/+2
| | | Co-authored-by: Jörg Deckert <jdeckert@unitas-network.de>
* Add support for conditions on the machines firmwareUwe Kleine-König2021-04-281-0/+1
| | | | | | This allows to limit units to machines that run on a certain firmware type. For device tree defined machines checking against the machine's compatible is also possible.
* network: update log messageYu Watanabe2021-04-162-8/+6
| | | | | In some optimization level with gcc, including netdev->ifname in log message causes error.
* network: make log_netdev_xxx_errno() refuse zero errnoYu Watanabe2021-04-161-14/+23
|
* tree-wide: avoid uninitialized warning on _cleanup_ variablesLuca Boccassi2021-04-141-1/+1
| | | | | | | With some versions of the compiler, the _cleanup_ attr makes it think the variable might be freed/closed when uninitialized, even though it cannot happen. The added cost is small enough to be worth the benefit, and optimized builds will help reduce it even further.
* network: fix ipv6 tunnel encapsulation limit (#19087)hide2021-03-241-1/+1
| | | The encapsulation limit of IPv6 tunnel can not be set to 4, which is the default value of the encapsulation limit.
* tree-wide: coccinelle fixesFrantisek Sumsal2021-03-181-2/+1
| | | | Another batch of fixes (mostly) generated by Coccinelle.
* network: use null_or_empty_path()Yu Watanabe2021-03-051-14/+6
| | | | This also drops unnecessary fseek().
* network: Implement B.A.T.M.A.N. Advanced interface typeAnnika Wickert2021-02-255-2/+269
|
* shared/conf-parser: allow more than one location of the main config fileZbigniew Jędrzejewski-Szmek2021-02-211-2/+2
| | | | No functional change as long as only one path is passed.
* tree-wide: use in_addr_is_set() or friendsYu Watanabe2021-02-184-16/+14
|
* tree-wide: return NULL from freeing functionsZbigniew Jędrzejewski-Szmek2021-02-163-17/+15
| | | | | | I started working on this because I wanted to change how DEFINE_TRIVIAL_CLEANUP_FUNC is defined. Even independently of that change, it's nice to make make things more consistent and predictable.
* tree-wide: use error codes in xxx_from_string()Yu Watanabe2021-02-123-3/+4
|
* tree-wide: use -EINVAL for enum invalid valuesZbigniew Jędrzejewski-Szmek2021-02-108-13/+13
| | | | | | | | | As suggested in https://github.com/systemd/systemd/pull/11484#issuecomment-775288617. This does not touch anything exposed in src/systemd. Changing the defines there would be a compatibility break. Note that tests are broken after this commit. They will be fixed in the next one.
* tree-wide: add spdx header on all scripts and helpersZbigniew Jędrzejewski-Szmek2021-01-281-0/+1
| | | | | | Even though many of those scripts are very simple, it is easier to include the header than to try to say whether each of those files is trivial enough not to require one.
* Merge pull request #18294 from ssahani/net-2Yu Watanabe2021-01-191-23/+7
|\ | | | | tree wide use ensure_put
| * network: macsec - use ordered_hashmap_ensure_putSusant Sahani2021-01-181-23/+7
| |
* | network: bond - use ordered_set_ensure_putSusant Sahani2021-01-181-5/+3
|/
* network: Use ordered_hashmap_ensure_put (#18233)Susant Sahani2021-01-171-5/+1
|
* Merge pull request #18230 from ssahani/macvlan-bcqueuelenYu Watanabe2021-01-173-0/+57
|\ | | | | network: macvlan - add support to configure rx queue for broadcast / multicast
| * network: macvlan - add support to configure rx queue for broadcast/multicastSusant Sahani2021-01-173-0/+57
| |
* | Merge pull request #18243 from ssahani/ensure-put-useYu Watanabe2021-01-172-10/+4
|\ \ | | | | | | tree-wide: introduce hashmap_ensure_put() and use it
| * | network: wireguard - Use hashmap_ensure_putSusant Sahani2021-01-151-5/+1
| | |
| * | network: netdev - Use hashmap_ensure_putSusant Sahani2021-01-151-5/+3
| |/
* | network: macsec - tighten variable scope used in loopSusant Sahani2021-01-151-2/+1
|/
* network: Allow to configure VLan egress qos mapsSusant Sahani2021-01-123-0/+21
|
* network: Allow to configure VLan egress qos mapsSusant Sahani2021-01-123-0/+120
|
* network: mtu is neither a boolean nor a pointerYu Watanabe2020-12-071-1/+1
|
* network: add Protocol= to vlan netdev (#17794)walbit-de2020-12-023-0/+9
|
* fileio: teach read_full_file_full() to read from offset/with maximum sizeLennart Poettering2020-12-012-2/+2
|
* network: fix return valuesYu Watanabe2020-11-271-5/+4
|
* network: use SYNTHETIC_ERRNO() macroYu Watanabe2020-11-271-4/+2
|
* Merge pull request #17478 from yuwata/split-network-internalYu Watanabe2020-11-275-8/+50
|\ | | | | libsystemd-network: split network-internal.c
| * tree-wide: drop unnecessary inclusion of network-internal.hYu Watanabe2020-10-292-2/+0
| |
| * net-condition: move net_match_config() and related conf parsersYu Watanabe2020-10-291-5/+5
| |
| * network: move config_parse_bridge_port_priority()Yu Watanabe2020-10-292-1/+45
| |
* | network: use the common "cannot" formZbigniew Jędrzejewski-Szmek2020-11-171-1/+1
| | | | | | | | Just for consistency.
* | man/systemd.netdev: remove bogus markupZbigniew Jędrzejewski-Szmek2020-11-171-1/+1
| | | | | | | | | | There is no "Multicast" constant, and NULL doesn't make sense in the context of addresses.
* | license: LGPL-2.1+ -> LGPL-2.1-or-laterYu Watanabe2020-11-0948-48/+48
| |
* | fileio: beef up READ_FULL_FILE_CONNECT_SOCKET to allow setting sender socket ↵Lennart Poettering2020-11-032-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | name This beefs up the READ_FULL_FILE_CONNECT_SOCKET logic of read_full_file_full() a bit: when used a sender socket name may be specified. If specified as NULL behaviour is as before: the client socket name is picked by the kernel. But if specified as non-NULL the client can pick a socket name to use when connecting. This is useful to communicate a minimal amount of metainformation from client to server, outside of the transport payload. Specifically, these beefs up the service credential logic to pass an abstract AF_UNIX socket name as client socket name when connecting via READ_FULL_FILE_CONNECT_SOCKET, that includes the requesting unit name and the eventual credential name. This allows servers implementing the trivial credential socket logic to distinguish clients: via a simple getpeername() it can be determined which unit is requesting a credential, and which credential specifically. Example: with this patch in place, in a unit file "waldo.service" a configuration line like the following: LoadCredential=foo:/run/quux/creds.sock will result in a connection to the AF_UNIX socket /run/quux/creds.sock, originating from an abstract namespace AF_UNIX socket: @$RANDOM/unit/waldo.service/foo (The $RANDOM is replaced by some randomized string. This is included in the socket name order to avoid namespace squatting issues: the abstract socket namespace is open to unprivileged users after all, and care needs to be taken not to use guessable names) The services listening on the /run/quux/creds.sock socket may thus easily retrieve the name of the unit the credential is requested for plus the credential name, via a simpler getpeername(), discarding the random preifx and the /unit/ string. This logic uses "/" as separator between the fields, since both unit names and credential names appear in the file system, and thus are designed to use "/" as outer separators. Given that it's a good safe choice to use as separators here, too avoid any conflicts. This is a minimal patch only: the new logic is used only for the unit file credential logic. For other places where we use READ_FULL_FILE_CONNECT_SOCKET it is probably a good idea to use this scheme too, but this should be done carefully in later patches, since the socket names become API that way, and we should determine the right amount of info to pass over.
* | tree-wide: use the usual SPDX header for our own filesZbigniew Jędrzejewski-Szmek2020-10-291-0/+2
|/
* network: header cleanupYu Watanabe2020-10-071-1/+0
|
* network: cleanup headers in networkd-neighbor.[ch]Yu Watanabe2020-10-071-0/+1
|
* Merge pull request #16929 from ssahani/network-bare-udpYu Watanabe2020-09-175-0/+180
|\ | | | | network: introduce Bare UDP Tunnelling
| * network: Introduce bare UDPSusant Sahani2020-09-175-0/+180
| |
* | network: Allow vxlan to be created without .network fileSusant Sahani2020-09-174-2/+6
|/
* network: slightly update log messageYu Watanabe2020-09-101-2/+3
|
* network do not ignore OOM error in config_parse_macsec_key_id()Yu Watanabe2020-09-101-0/+2
|
* network: use _cleanup_ attribute at one more placeYu Watanabe2020-09-101-1/+3
|
* network: do not ignore OOM error in wireguard_decode_key_and_warn()Yu Watanabe2020-09-101-2/+3
|