Commit Graph

44095 Commits

Author SHA1 Message Date
Lennart Poettering
d8def0f312 dissect: add new verbs to brief version of cmline in --help 2023-07-07 17:13:32 +01:00
Yu Watanabe
9bf0fe3633 Merge pull request #28287 from yuwata/network-null-address
network: fix null address handling
2023-07-08 01:13:17 +09:00
Luca Boccassi
caf8495e90 typo: dont -> don't 2023-07-07 11:51:33 +01:00
Yu Watanabe
d0009d9290 network: make address_get() work for null address
When a static null address is requested, e.g. Address=0.0.0.0/24,
then the corresponding Address object owned by Network object has
null address, and previously it did not match any addresses already
assigne to the interface.

Let's search matching Address object when originally it is requested as
the null address.

Then, the address configured with requested as a null address will be
kept on reconfigure.

Fixes #26113.
2023-07-07 19:11:37 +09:00
Yu Watanabe
9684a8ded0 network: always copy input address for link_request_address()
Then, the code becomes much simpler.
This also adds several missing log messages.

No functional change, just refactoring.
2023-07-07 19:11:37 +09:00
Yu Watanabe
0b8b30f6bb network: also use address_kernel_{hash,compare}_func() for managing address requests
Request may refer Address object owned by Link, but its broadcast
address or label may be updated by address_equalify(), hence these
fields cannot be used in the hash and compare functions.
2023-07-07 19:11:37 +09:00
Yu Watanabe
14044a4114 network: log broadcast address and address label 2023-07-07 19:11:37 +09:00
Yu Watanabe
0acc647010 network: ignore Broadcast= setting when the address is null
When an address is requested with null address, then broadcast should be
determined after an address aquired that will be assigned to the
interface.
2023-07-07 19:11:37 +09:00
Yu Watanabe
9a45125ae7 network: split-out address_section_adjust_broadcast()
No functional change, just refactoring.
2023-07-07 19:11:33 +09:00
Lily Foster
9cf2203524 fstab-generator: unify initrd-root-device.target dependency handling code
This fixes a bug from #26038 where it would actually write generator
stuff during sysroot check when it was only supposed to check for daemon
reload.
2023-07-07 11:58:43 +09:00
Yu Watanabe
14be337d04 Merge pull request #28233 from mrc0mmand/append-to-corrupted-journals
test: append to corrupted journals
2023-07-07 11:51:02 +09:00
Yu Watanabe
d859cf15eb Merge pull request #28286 from yuwata/network-dhcp4-classless-static-routes
network,dhcp4: do not ignore gateway in classless static routes option
2023-07-07 10:12:06 +09:00
Yu Watanabe
75a9122678 network,ndisc: use ndisc_captive_portal_free() at one more place
Fixes another memleak introduced by 64de00c49f.
Fixes #28283.
2023-07-07 09:18:25 +09:00
Yu Watanabe
77451f654a network/dhcp4: do not ignore the gateway even if the destination is in the same network
Fixes #28280.
2023-07-07 06:56:30 +09:00
Frantisek Sumsal
29bdeb5cb3 test: append to corrupted journals
Introduce a manual test tool that creates a journal, corrupts it by
flipping bits at given offsets, and then attempts to write to the journal.
In ideal case we should handle this gracefully without any crash or
memory corruption.
2023-07-06 22:41:27 +02:00
Luca Boccassi
b2deaaf01b Merge pull request #27584 from rphibel/add-restartquick-option
service: add new RestartMode option
2023-07-06 20:37:31 +01:00
Luca Boccassi
25cae3e7bb Merge pull request #20425 from Blarse/passwdqc-pr
Add passwdqc support
2023-07-06 20:36:04 +01:00
Yu Watanabe
535134bc51 network,ndisc: use correct free function for captive portal
Fixes memleak introduced by 64de00c49f.
Fixes #28277.
2023-07-06 20:30:22 +01:00
Luca Boccassi
f00022eb86 Merge pull request #28242 from berrange/cond-sec-cvm
Detect and expose the confidential virtualization technology in various places
2023-07-06 19:14:26 +01:00
Luca Boccassi
b9b0f338be Merge pull request #28274 from DaanDeMeyer/dissect-root
dissect: Allow a few verbs to operate on directories as well as image files
2023-07-06 14:41:48 +01:00
Richard Phibel
2a39b91459 service: fix for RestartMode=direct option
With the fix done in PR28215, the unit restart job is created with type JOB_START.
Because of that, it is not properly merged anymore with the old one: the
merged job has state JOB_RUNNING. It should have state JOB_WAITING.

I think that the old job is not cleaned up because we don't go through the failed state.

With this fix, the merged job is properly created with state JOB_WAITING.
2023-07-06 14:35:33 +02:00
Richard Phibel
e568fea9fc service: add new RestartMode option
When this option is set to direct, the service restarts without entering a failed
state. Dependent units are not notified of transitory failure.

This is useful for the following use case:

We have a target with Requires=my-service, After=my-service.
my-service.service is a oneshot service and has Restart=on-failure in
its definition.

my-service.service can get stuck for various reasons and time out, in
which case it is restarted. Currently, when it fails the first time, the
target fails, even though my-service is restarted.

The behavior we're looking for is that until my-service is not restarted
anymore, the target stays pending waiting for my-service.service to
start successfully or fail without being restarted anymore.
2023-07-06 14:33:52 +02:00
Daniel P. Berrangé
6e2e83b487 udev: add 'conf-virt' constant for confidential virtualization tech
Related: https://github.com/systemd/systemd/issues/27604
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2023-07-06 12:20:04 +01:00
Daniel P. Berrangé
0895124572 core: set SYSTEMD_CONFIDENTIAL_VIRTUALIZATION env for generators
This reports the confidential virtualization type that was detected

Related: https://github.com/systemd/systemd/issues/27604
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2023-07-06 12:20:04 +01:00
Daniel P. Berrangé
024469ddb9 core: log detected confidential virtualization type
Related: https://github.com/systemd/systemd/issues/27604
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2023-07-06 12:20:04 +01:00