Commit Graph

40138 Commits

Author SHA1 Message Date
Yu Watanabe 11309591a5 test-network: check tunnel netdevs become operstate 'routable' 2019-05-16 10:37:11 +09:00
Susant Sahani 4502a61c8a networkd: FOU tunnel support Local and Peer tunnel addresses 2019-05-16 10:24:48 +09:00
Susant Sahani 397a74ddea sd-netlink: Add Fou properties FOU_ATTR_LOCAL_V4/FOU_ATTR_PEER_V4
FOU_ATTR_LOCAL_V6
FOU_ATTR_PEER_V6
FOU_ATTR_PEER_PORT
FOU_ATTR_IFINDEX
2019-05-16 10:24:48 +09:00
Yu Watanabe a3824444e5 linux: update headers from current kernel master 2019-05-16 10:24:47 +09:00
Yu Watanabe 956c8feca4 test-network: add a basic test for ipvtap 2019-05-16 09:48:53 +09:00
Susant Sahani 69c317a07f networkd: introduce netdev ipvtap
This patch adds netdev ipvtap that is based on the
IP-VLAN network interface, called ipvtap. An ipvtap device can be created
in the same way as an ipvlan device, using 'kind ipvtap', and then accessed
using the tap user space interface.
2019-05-16 09:48:53 +09:00
Yu Watanabe af2fa2c116 network: disable link local addressing on ipip, gre, sit, and vti netdevs
Closes #12547.
2019-05-16 05:53:41 +09:00
Yu Watanabe b71d9a1296 wait-online: ignore -ENODATA on updating link information
When netdev is not created yet, the -ENODATA is returned.
2019-05-16 05:53:41 +09:00
Yu Watanabe 710ce9e537 network: link_check_ready() returns earlier if routes are not configured yet
link_request_set_routes() calls link_check_ready(), so it is not
necessary to continue that here.
2019-05-16 05:53:41 +09:00
Yu Watanabe 05dc2132e0
Merge pull request #12496 from yuwata/network-on-device-default-route
network: add DefaultRouteOnDevice= setting in [Network] section
2019-05-15 22:46:25 +02:00
Balint Reczey 13a43c73d8 Add check to switch VTs only between K_XLATE or K_UNICODE
Switching to K_UNICODE from other than L_XLATE can make the keyboard
unusable and possibly leak keypresses from X.

BugLink: https://launchpad.net/bugs/1803993
2019-05-15 22:28:56 +02:00
Yu Watanabe 80a8a7fb20 analyze: fix help message 2019-05-15 15:09:45 +02:00
Jan Synacek 63ea8032f2 man: note that journal does not validate syslog fields 2019-05-15 15:09:27 +02:00
Lennart Poettering 73130b0bcf
Merge pull request #12565 from zachsmith/fix-log-message-typos
systemd-sleep: Fix typos in log messages
2019-05-15 10:50:03 +02:00
Thadeu Lima de Souza Cascardo 59c55e73ea ask-password: prevent buffer overrow when reading from keyring
When we read from keyring, a temporary buffer is allocated in order to
determine the size needed for the entire data. However, when zeroing that area,
we use the data size returned by the read instead of the lesser size allocate
for the buffer.

That will cause memory corruption that causes systemd-cryptsetup to crash
either when a single large password is used or when multiple passwords have
already been pushed to the keyring.

Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
2019-05-15 10:49:46 +02:00
Yu Watanabe 2b00dff809 test-network: add a test for IPv4LLRoute= 2019-05-15 12:44:30 +09:00
Yu Watanabe 6543b7fd78 test-network: add tests for DefaultRouteOnDevice= 2019-05-15 12:44:30 +09:00
Yu Watanabe 5d5003ab35 network: add DefaultRouteOnDevice= setting in [Network] section
When enabled, then default route bound to the interface will be created.
This is useful when adding routes on point-to-point interfaces.

Closes #788.
2019-05-15 12:44:30 +09:00
Yu Watanabe 807341ec99 network: add missing error check 2019-05-15 12:44:30 +09:00
Susant Sahani deb2cfa4c6 networkd: do not generate MAC for bridge device.
closes https://github.com/systemd/systemd/issues/12558
2019-05-15 04:03:14 +02:00
Zach Smith 6835d78dfe fix typo in partition device message 2019-05-14 07:08:27 -07:00
Frantisek Sumsal b6ec9afd44
Merge pull request #12562 from evverx/timeouts
tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly
2019-05-14 14:19:41 +02:00
Evgeny Vereshchagin a0603f8c28 tests: make fuzzbuzz.sh compatible with Azure Pipelines again
Now that https://github.com/systemd/systemd/pull/12542 is merged,
fuzzbuzz.sh should be changed a little bit to make it work
on Azure Pipelines. We can no longer assume that source repositories
are added "automagically" by Travis CI or that PATH is set properly.
2019-05-14 13:58:05 +02:00
Evgeny Vereshchagin 0cd158f643 README: bring the coverity badge back
This reverts commit bf0e551c17.
2019-05-14 13:42:17 +02:00
Evgeny Vereshchagin 9c5c4677fa fuzzers: use -fsanitizer=fuzzer if clang supports it
Closes https://github.com/systemd/systemd/issues/10645
2019-05-14 13:42:17 +02:00
Evgeny Vereshchagin 8c6637bab2 travis: make sure the fuzzers can be built in "local" mode 2019-05-14 13:42:17 +02:00
Evgeny Vereshchagin e67d88e74b tests: turn on the QEMU part in the Xenial job
The test has been flaky since varlink was merged.
Let's not annoy people with the test that fails more often than not.

It should be OK because the same test is run on Arch.
2019-05-14 13:13:04 +02:00
Evgeny Vereshchagin bedae21ec5 tests: set NSPAWN_TIMEOUT and QEMU_TIMEOUT explicitly
These were never set explictily because we relied on Travis CI
canceling a job if it's been stuck for 10 minutes. Now that
the script is run on Azure Pipelines (where the default timeout
is 60 minutes) we should limit the script manually to avoid waiting
for an hour for broken jobs to finish.
2019-05-14 13:04:42 +02:00
Evgeny Vereshchagin 5de55cc865
Merge pull request #12542 from evverx/TEST-PIPELINE
move the FuzzBuzz stage to Azure Pipelines
2019-05-14 13:49:54 +03:00
Michael Biebl b62bc66018
Merge pull request #12536 from poettering/rdrand-workaround-on-amd
random-util: eat up bad RDRAND values seen on AMD CPUs
2019-05-14 12:29:41 +02:00
Evgeny Vereshchagin e92d3d5113 README: yet another badge. with the status of Pipelines this time. 2019-05-14 12:22:10 +02:00
Evgeny Vereshchagin 2da8298b90 tests: move the FuzzBuzz stage from Travis CI to Azure Pipelines 2019-05-14 12:22:10 +02:00
Evgeny Vereshchagin fa8ac5eb77 tests: make fuzzbuzz.sh compatible with Azure Piplines 2019-05-14 12:22:03 +02:00
Evgeny Vereshchagin e5984b1d1b tests: try to run fuzzbuzz.sh with Azure Pipelines to see how it fares there 2019-05-14 11:45:57 +02:00
Yu Watanabe 6e114a2475
Merge pull request #12555 from ssahani/route-properties
networkd: route add support to configure fastopen_no_cookie
2019-05-14 09:03:52 +02:00
Susant Sahani 1501b429a9 networkd: DHCP client add support to send RELEASE packet
closes #10820
2019-05-14 09:03:01 +02:00
Zach Smith 45733c9d21 fix typo in wakealarm message 2019-05-13 20:01:36 -07:00
Susant Sahani 67c193bfb0 networkd: route fix coding style 2019-05-14 08:09:54 +05:30
Susant Sahani 633c725865 networkd: route add support to configure fastopen_no_cookie
This patch adds fastopen_no_cookie option to enable/disable TCP fastopen
without a cookie on a per-route basis.
2019-05-14 08:08:36 +05:30
Susant Sahani bdb397ed10 networkd: bridge FDB support more NTF_* flags
Add support to configure NTF_ROUTER and NTF_USE
2019-05-14 02:24:51 +02:00
Yu Watanabe d8f31d7d32
Merge pull request #12537 from yuwata/network-link-local-follow-ups
network: do not send ipv6 token to kernel
2019-05-14 02:22:18 +02:00
Frantisek Sumsal 04ea08b5a4 travis: move the Xenial phase to Azure Pipelines 2019-05-13 23:24:31 +03:00
Xi Ruoyao a45ef5070d tmpfiles: do not create /run/nologin if PAM is disabled
If systemd is not built with PAM support, systemd-user-sessions.service
won't be built.  On systems without PAM, /run/nologin is useless.  On
systems with PAM but systemd is not built with PAM, /run/nologin won't
be removed and all unprivileged users can't login.

So, we should not create /run/nologin if systemd is built without PAM.
2019-05-13 15:35:51 +02:00
Simon Schricker ccc162e03c man: mention garbage collection of failed conditions
See discussion:
https://github.com/systemd/systemd/issues/2234
2019-05-13 15:34:49 +02:00
Susant Sahani f4679bcb57 sd-netlink: support RTAX_FASTOPEN_NO_COOKIE 2019-05-13 16:44:55 +05:30
Lennart Poettering 2d209e1e7b
Merge pull request #12546 from jwrdegoede/hwdb-logitech-s510
Hwdb logitech s510
2019-05-13 10:47:07 +02:00
Hans de Goede 0c4478b122 hwdb: Add key mappings for Logitech S510 keyboard and remote control
The S510 keyboard and S510 remote control both have 1 key where the markings
on the key dop not match with the generic Logitech 27MHz keymap.

This commit adds device specific overrides for this.
2019-05-12 12:30:22 +02:00
Hans de Goede 55f85b3f1a hwdb: Update generic Logitech 27 MHz keyboard key mappings
This commit makes 2 changes to the generic Logitech 27 MHz keyboard keymap:
1. It moves some codes from being keyboard specific to the generic 27MHz
   mapping table, these codes do not conflict on different models and at
   least the c1019 - c101b codes are not only used on the MX3000 keyboard,
   but also on the S510 Remote control
2. Add a bunch of new codes found on the S510 keyboard and S510 remote control
2019-05-12 12:30:22 +02:00
Evgeny Vereshchagin 1328a4bcc9
Merge pull request #12524 from evverx/UBSan-reports
tests: stop sending UBsan reports to /dev/null
2019-05-12 05:17:16 +03:00
Evgeny Vereshchagin 52899bebc4 tests: hook up the repository to Azure Pipelines
The idea is to move a couple of stages from Travis CI (which has been
overloaded since I added the "FuzzBuzz" stage) to Azure Pipelines.
2019-05-12 04:09:55 +02:00